CHANGE): team_slave_0: link becomes ready [ 179.406550][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.416205][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.424831][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.432907][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.444202][ T6335] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.456671][ T6335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.467506][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.475541][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.483680][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.493946][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.503948][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.517935][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.525625][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.534490][ T6335] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.592994][ T6318] device veth0_vlan entered promiscuous mode [ 179.612564][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.620963][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.630617][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.638364][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.646126][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.654953][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.664343][ T6318] device veth1_vlan entered promiscuous mode [ 179.678889][ T6390] chnl_net:caif_netlink_parms(): no params data found [ 179.708526][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 179.716865][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 179.724951][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.733471][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.749501][ T6318] device veth0_macvtap entered promiscuous mode [ 179.764214][ T6335] device veth0_vlan entered promiscuous mode [ 179.780866][ T6318] device veth1_macvtap entered promiscuous mode [ 179.788465][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 179.796906][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.805032][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.813228][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.824069][ T6335] device veth1_vlan entered promiscuous mode [ 179.830830][ T6390] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.837940][ T6390] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.846369][ T6390] device bridge_slave_0 entered promiscuous mode [ 179.857570][ T6318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.865356][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.874304][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.882444][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 179.891820][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.900672][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.915038][ T6390] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.922074][ T6390] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.930705][ T6390] device bridge_slave_1 entered promiscuous mode [ 179.939515][ T6318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 179.947041][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 179.956613][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.965242][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.978075][ T6335] device veth0_macvtap entered promiscuous mode [ 179.988384][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.997027][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.005852][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 180.020371][ T6335] device veth1_macvtap entered promiscuous mode [ 180.032608][ T6390] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.045925][ T6390] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.074940][ T6390] team0: Port device team_slave_0 added [ 180.081998][ T6390] team0: Port device team_slave_1 added [ 180.093484][ T6335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.103994][ T6335] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.116495][ T6335] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 180.132795][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.142277][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.151565][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.168842][ T6433] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 180.180381][ T6433] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.188516][ T6433] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.200892][ T6433] device bridge_slave_0 left promiscuous mode [ 180.207579][ T6433] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.217939][ T6433] device bridge_slave_1 left promiscuous mode [ 180.224230][ T6433] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.235636][ T6433] bond0: (slave bond_slave_0): Releasing backup interface [ 180.255929][ T6433] bond0: (slave bond_slave_1): Releasing backup interface [ 180.289858][ T6433] team0: Port device team_slave_0 removed [ 180.315671][ T6433] team0: Port device team_slave_1 removed [ 180.327135][ T6433] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 180.335005][ T6433] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 180.344235][ T6433] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 180.352045][ T6433] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 180.372716][ T6335] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 180.392340][ T24] audit: type=1400 audit(1637882252.753:184): avc: denied { unmount } for pid=6318 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 180.422236][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.431431][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.457691][ T6390] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.464642][ T6390] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.490605][ T6390] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:17:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 180.532365][ T6390] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.539405][ T6390] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.565522][ T6390] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.608280][ T6390] device hsr_slave_0 entered promiscuous mode [ 180.620435][ T6390] device hsr_slave_1 entered promiscuous mode [ 180.637493][ T6390] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 180.645111][ T6390] Cannot create hsr debugfs directory [ 180.717425][ T6439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 180.770212][ T6439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.790453][ T6439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 181.054768][ T6422] chnl_net:caif_netlink_parms(): no params data found [ 181.127985][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 181.180582][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.200733][ T6441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 181.457756][ T6422] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.464884][ T6422] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.485722][ T6422] device bridge_slave_0 entered promiscuous mode [ 181.505373][ T6422] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.512422][ T6422] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.522553][ T6422] device bridge_slave_1 entered promiscuous mode [ 181.542468][ T6390] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.551787][ T6422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.563454][ T6422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.585086][ T6422] team0: Port device team_slave_0 added [ 181.593088][ T6422] team0: Port device team_slave_1 added [ 181.606710][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.614328][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.623109][ T6390] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.634652][ T6422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 181.641650][ T6422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.667544][ T6422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 181.681302][ T6422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 181.688307][ T6422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 181.714608][ T6422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 181.732552][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.742233][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.750722][ T77] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.757846][ T77] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.765906][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.774498][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.782991][ T77] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.790111][ T77] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.806312][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.814205][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.823043][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.833540][ T6422] device hsr_slave_0 entered promiscuous mode [ 181.840359][ T6422] device hsr_slave_1 entered promiscuous mode [ 181.847778][ T6422] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.855387][ T6422] Cannot create hsr debugfs directory [ 181.868521][ T1845] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.879972][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.888434][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.897155][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.911190][ T6390] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.921652][ T6390] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.935970][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.944238][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.952796][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.961268][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.969670][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.977794][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.991229][ T6390] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.004515][ T1845] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.018152][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.026321][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.033787][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.090932][ T6422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.102927][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 182.111349][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.125490][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.135998][ T6422] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.147945][ T1845] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.165981][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.174910][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.183104][ T47] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.190125][ T47] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.197741][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.206319][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.214655][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.221689][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.240353][ T1845] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 182.256031][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.265738][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.274307][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.283235][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.291337][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.304648][ T6422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.312806][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.321616][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.330443][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.347026][ T6422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.354409][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.362134][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.441717][ T6390] device veth0_vlan entered promiscuous mode [ 182.461494][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.470040][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.481072][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.489093][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.506442][ T6390] device veth1_vlan entered promiscuous mode [ 182.535476][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.544341][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.553384][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.562108][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.572177][ T6390] device veth0_macvtap entered promiscuous mode [ 182.587409][ T6452] chnl_net:caif_netlink_parms(): no params data found [ 182.597504][ T6390] device veth1_macvtap entered promiscuous mode [ 182.619409][ T6390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 182.629944][ T6390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.648578][ T6390] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 182.745412][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 182.753415][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 182.761738][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.770970][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.780252][ T6390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 182.790849][ T6390] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.802383][ T6390] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 182.829966][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.838840][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.857087][ T6452] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.864130][ T6452] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.876960][ T6452] device bridge_slave_0 entered promiscuous mode [ 182.884667][ T6452] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.891734][ T6452] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.899355][ T6452] device bridge_slave_1 entered promiscuous mode [ 182.919950][ T6452] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.930656][ T6452] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.959710][ T6422] device veth0_vlan entered promiscuous mode [ 182.980090][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.988320][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.002714][ T6452] team0: Port device team_slave_0 added [ 183.033505][ T6523] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 183.045803][ T6523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 183.053433][ T6523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.063934][ T6523] device bridge_slave_0 left promiscuous mode [ 183.070324][ T6523] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.080824][ T6523] device bridge_slave_1 left promiscuous mode [ 183.087864][ T6523] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.099251][ T6523] bond0: (slave bond_slave_0): Releasing backup interface [ 183.121483][ T6523] bond0: (slave bond_slave_1): Releasing backup interface [ 183.159204][ T6523] team0: Port device team_slave_0 removed [ 183.195384][ T6523] team0: Port device team_slave_1 removed [ 183.203762][ T6523] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 183.211340][ T6523] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 183.220536][ T6523] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 183.228167][ T6523] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 183.246366][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.253930][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.271547][ T6452] team0: Port device team_slave_1 added [ 183.293935][ T6452] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.300908][ T6452] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.326985][ T6452] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.340084][ T6422] device veth1_vlan entered promiscuous mode [ 183.393000][ T6452] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.399984][ T6452] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.426721][ T6452] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.479565][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 183.488061][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 183.517138][ T6452] device hsr_slave_0 entered promiscuous mode [ 183.533181][ T6452] device hsr_slave_1 entered promiscuous mode [ 183.545651][ T6452] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 183.553380][ T6452] Cannot create hsr debugfs directory [ 183.586734][ T6422] device veth0_macvtap entered promiscuous mode [ 183.598365][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.607316][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.624014][ T6498] chnl_net:caif_netlink_parms(): no params data found [ 183.636596][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 183.664591][ T6422] device veth1_macvtap entered promiscuous mode [ 183.704244][ T6422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 183.714751][ T6422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.726339][ T6422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 183.750842][ T6498] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.757994][ T6498] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.766558][ T6498] device bridge_slave_0 entered promiscuous mode [ 183.773641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.781776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.790309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.799913][ T6422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 183.810479][ T6422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.821267][ T6422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.832645][ T6498] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.839812][ T6498] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.847374][ T6498] device bridge_slave_1 entered promiscuous mode [ 183.869361][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.878157][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.901420][ T6498] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.913721][ T6498] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.979585][ T6498] team0: Port device team_slave_0 added 23:17:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 184.053455][ T6498] team0: Port device team_slave_1 added [ 184.070767][ T6452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.173007][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 184.231158][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.241520][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 184.465134][ T6452] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.482766][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.496718][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.510672][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.529687][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.548398][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.555643][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state 23:17:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 184.565339][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.574052][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.583902][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.590977][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.607867][ T6578] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 184.644232][ T6578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 184.653750][ T6578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 184.680640][ T6498] batman_adv: batadv0: Adding interface: batadv_slave_0 23:17:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 184.687717][ T6498] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.714802][ T6498] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.795605][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.814992][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.826779][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.847416][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.862503][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.881445][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.900242][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.928513][ T6452] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 184.938890][ T6452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 184.972173][ T6498] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.979159][ T6498] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.005088][ T6498] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.022235][ T6583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 185.033360][ T6583] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 185.041637][ T6583] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 185.066695][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.095508][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.103926][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.125453][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.144867][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.165478][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.200250][ T6498] device hsr_slave_0 entered promiscuous mode [ 185.216821][ T6498] device hsr_slave_1 entered promiscuous mode [ 185.236730][ T6498] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 185.244291][ T6498] Cannot create hsr debugfs directory [ 185.254434][ T6452] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.276680][ T1845] device hsr_slave_0 left promiscuous mode [ 185.282865][ T1845] device hsr_slave_1 left promiscuous mode [ 185.295082][ T1845] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 185.302518][ T1845] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 185.323668][ T1845] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 185.331164][ T1845] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 185.355734][ T1845] device bridge_slave_1 left promiscuous mode [ 185.361880][ T1845] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.385542][ T1845] device bridge_slave_0 left promiscuous mode [ 185.391696][ T1845] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.419656][ T1845] device hsr_slave_0 left promiscuous mode [ 185.437191][ T1845] device hsr_slave_1 left promiscuous mode [ 185.450748][ T1845] device hsr_slave_0 left promiscuous mode [ 185.458807][ T1845] device hsr_slave_1 left promiscuous mode [ 185.466346][ T1845] device hsr_slave_0 left promiscuous mode [ 185.472315][ T1845] device hsr_slave_1 left promiscuous mode [ 185.483109][ T1845] device veth1_macvtap left promiscuous mode [ 185.489176][ T1845] device veth0_macvtap left promiscuous mode [ 185.495195][ T1845] device veth1_vlan left promiscuous mode [ 185.500896][ T1845] device veth0_vlan left promiscuous mode [ 185.507030][ T1845] device veth1_macvtap left promiscuous mode [ 185.512989][ T1845] device veth0_macvtap left promiscuous mode [ 185.519181][ T1845] device veth1_vlan left promiscuous mode [ 185.524915][ T1845] device veth0_vlan left promiscuous mode [ 185.531062][ T1845] device veth1_macvtap left promiscuous mode [ 185.537101][ T1845] device veth0_macvtap left promiscuous mode [ 185.543142][ T1845] device veth1_vlan left promiscuous mode [ 185.548970][ T1845] device veth0_vlan left promiscuous mode [ 185.555393][ T1845] device veth1_macvtap left promiscuous mode [ 185.561451][ T1845] device veth0_macvtap left promiscuous mode [ 185.567477][ T1845] device veth1_vlan left promiscuous mode [ 185.573197][ T1845] device veth0_vlan left promiscuous mode [ 185.821360][ T1845] team0 (unregistering): Port device team_slave_1 removed [ 185.832499][ T1845] team0 (unregistering): Port device team_slave_0 removed [ 185.842361][ T1845] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 185.853991][ T1845] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 185.883427][ T1845] bond0 (unregistering): Released all slaves [ 185.974222][ T1845] bond0 (unregistering): Released all slaves [ 186.075843][ T1845] bond0 (unregistering): Released all slaves [ 186.208267][ T1845] bond0 (unregistering): Released all slaves [ 186.256465][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.263987][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.400696][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.415302][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.435209][ T6498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.464096][ T6587] chnl_net:caif_netlink_parms(): no params data found [ 186.477005][ T6498] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.489561][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.505400][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.576430][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.586753][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.596630][ T77] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.603757][ T77] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.612936][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.625471][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.633716][ T77] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.640768][ T77] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.650011][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.658845][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.669234][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.677719][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.687254][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.696032][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.704473][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.712962][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.721060][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.729627][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.763381][ T6498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.777950][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.785873][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.814299][ T6498] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.827395][ T6452] device veth0_vlan entered promiscuous mode [ 186.841824][ T6587] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.848984][ T6587] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.856951][ T6587] device bridge_slave_0 entered promiscuous mode [ 186.865663][ T6591] chnl_net:caif_netlink_parms(): no params data found [ 186.874336][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 186.881922][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 186.889310][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.897671][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.906358][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.914175][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.924046][ T6452] device veth1_vlan entered promiscuous mode [ 186.931444][ T6587] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.938531][ T6587] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.946693][ T6587] device bridge_slave_1 entered promiscuous mode [ 186.993944][ T6452] device veth0_macvtap entered promiscuous mode [ 187.003414][ T6452] device veth1_macvtap entered promiscuous mode [ 187.016299][ T6587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.026844][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 187.035290][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 187.043532][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.051948][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.060208][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.068504][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.095717][ T6587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.129387][ T6587] team0: Port device team_slave_0 added [ 187.136559][ T6587] team0: Port device team_slave_1 added [ 187.144184][ T6452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 187.154798][ T6452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.165969][ T6452] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 187.173242][ T6591] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.180354][ T6591] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.188312][ T6591] device bridge_slave_0 entered promiscuous mode [ 187.195716][ T6591] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.202805][ T6591] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.213160][ T6591] device bridge_slave_1 entered promiscuous mode [ 187.220502][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.230359][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.240795][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.289273][ T6452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 187.299910][ T6452] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 187.311203][ T6452] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 187.318715][ T6587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.325693][ T6587] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.351568][ T6587] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.365227][ T6591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.383884][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.392480][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.404167][ T6587] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.411181][ T6587] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.437174][ T6587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 187.452395][ T6640] chnl_net:caif_netlink_parms(): no params data found [ 187.461554][ T6591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.505754][ T6498] device veth0_vlan entered promiscuous mode [ 187.526771][ T6587] device hsr_slave_0 entered promiscuous mode [ 187.533255][ T6587] device hsr_slave_1 entered promiscuous mode [ 187.540779][ T6591] team0: Port device team_slave_0 added [ 187.547507][ T6591] team0: Port device team_slave_1 added [ 187.554180][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.562369][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.570729][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.578549][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.592302][ T6498] device veth1_vlan entered promiscuous mode [ 187.606765][ T6695] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 187.620054][ T6695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.627881][ T6695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.639700][ T6695] device bridge_slave_0 left promiscuous mode [ 187.645979][ T6695] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.656525][ T6695] device bridge_slave_1 left promiscuous mode [ 187.663012][ T6695] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.673603][ T6695] bond0: (slave bond_slave_0): Releasing backup interface [ 187.695557][ T6695] bond0: (slave bond_slave_1): Releasing backup interface [ 187.742531][ T6695] team0: Port device team_slave_0 removed [ 187.760412][ T6695] team0: Port device team_slave_1 removed [ 187.770689][ T6695] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 187.778671][ T6695] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 187.790271][ T6695] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 187.797873][ T6695] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 187.840485][ T6498] device veth0_macvtap entered promiscuous mode [ 187.851017][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 187.859318][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 187.878740][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.887134][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.895631][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 187.912469][ T6591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.919589][ T6591] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.945566][ T6591] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.958596][ T6498] device veth1_macvtap entered promiscuous mode [ 187.971896][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 187.982654][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.990120][ T6698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.071141][ T6591] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.078274][ T6591] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.104665][ T6591] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.119675][ T6498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.130145][ T6498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.141120][ T6498] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.166232][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.174281][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.191582][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.204855][ T6498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.215377][ T6498] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.226485][ T6498] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.238882][ T6640] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.246131][ T6640] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.253947][ T6640] device bridge_slave_0 entered promiscuous mode [ 188.261688][ T6640] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.268744][ T6640] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.276588][ T6640] device bridge_slave_1 entered promiscuous mode [ 188.285720][ T6591] device hsr_slave_0 entered promiscuous mode [ 188.292620][ T6591] device hsr_slave_1 entered promiscuous mode [ 188.299250][ T6591] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.307108][ T6591] Cannot create hsr debugfs directory [ 188.319990][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.328630][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.360843][ T6640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.390087][ T6640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.419411][ T6640] team0: Port device team_slave_0 added [ 188.427508][ T6640] team0: Port device team_slave_1 added [ 188.454463][ T6728] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 188.473917][ T6728] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 188.489082][ T6728] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.497322][ T6728] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.508912][ T6728] device bridge_slave_0 left promiscuous mode [ 188.515392][ T6728] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.526042][ T6728] device bridge_slave_1 left promiscuous mode [ 188.532509][ T6728] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.542575][ T6728] bond0: (slave bond_slave_0): Releasing backup interface [ 188.563664][ T6728] bond0: (slave bond_slave_1): Releasing backup interface [ 188.599323][ T6728] team0: Port device team_slave_0 removed [ 188.630316][ T6728] team0: Port device team_slave_1 removed [ 188.641711][ T6728] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 188.649583][ T6728] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 188.660003][ T6728] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 188.667784][ T6728] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 188.741592][ T6640] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.748660][ T6640] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.774642][ T6640] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 189.005475][ T6730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 189.051871][ T6730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.077127][ T6730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 189.183688][ T6640] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 189.190679][ T6640] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.216636][ T6640] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 189.317759][ T6591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.386694][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 189.401198][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.409038][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.457797][ T6587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.472538][ T6640] device hsr_slave_0 entered promiscuous mode [ 189.480606][ T6640] device hsr_slave_1 entered promiscuous mode [ 189.487402][ T6640] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 189.495014][ T6640] Cannot create hsr debugfs directory [ 189.526800][ T6591] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.538368][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.548010][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.555717][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.563485][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.581606][ T6587] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.613347][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.623419][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.631935][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.639013][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.648404][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.657107][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.665378][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.672403][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.680189][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.688895][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.697613][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.705946][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.714484][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.722746][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.741363][ T6591] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.751768][ T6591] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.765850][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.773552][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.781521][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.789687][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.798163][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.806673][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.814915][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.821917][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.829509][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.837882][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.862031][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.870068][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.877878][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.886264][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.894578][ T77] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.901608][ T77] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.909292][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.917935][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.926601][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.935199][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.943935][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.961845][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.970279][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.979032][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.987418][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.998306][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.006494][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.016193][ T6587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.039728][ T6591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.054161][ T6587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.063562][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.071393][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.079130][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.092820][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.105895][ T6640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.126142][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.133858][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.144818][ T6640] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.154624][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.167253][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.175691][ T77] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.182722][ T77] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.202709][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.210840][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.226915][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.235286][ T4580] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.242360][ T4580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.250060][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.258900][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.267476][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.275905][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.284608][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.292994][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.301342][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.309740][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.323087][ T6640] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.333444][ T6640] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.397130][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.406325][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.415128][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.423656][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.433238][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.441739][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.451727][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.460404][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.479976][ T6640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.493539][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.501810][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.523058][ T6587] device veth0_vlan entered promiscuous mode [ 190.544061][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.556576][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.565704][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.573461][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.611284][ T6587] device veth1_vlan entered promiscuous mode [ 190.620758][ T6591] device veth0_vlan entered promiscuous mode [ 190.627606][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.636750][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.657220][ T6591] device veth1_vlan entered promiscuous mode [ 190.665756][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.673878][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.681681][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 190.689575][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 190.697676][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.706127][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.715030][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.723451][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.733127][ T6587] device veth0_macvtap entered promiscuous mode [ 190.741243][ T6587] device veth1_macvtap entered promiscuous mode [ 190.753703][ T6591] device veth0_macvtap entered promiscuous mode [ 190.781819][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 190.789747][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.797815][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.806357][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.818231][ T6587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.828719][ T6587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.840305][ T6587] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.851276][ T6591] device veth1_macvtap entered promiscuous mode [ 190.858383][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 190.866725][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.874556][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.883286][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.917065][ T6587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.927564][ T6587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.940215][ T6587] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.959298][ T6591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.969797][ T6591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.979623][ T6591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.990153][ T6591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.000949][ T6591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.008324][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.018274][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.026688][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.034641][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.043265][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.051853][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.074119][ T6640] device veth0_vlan entered promiscuous mode [ 191.081627][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.089445][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.100350][ T6591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.110947][ T6591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.120767][ T6591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.131383][ T6591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.142310][ T6591] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.161630][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.170303][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.187529][ T6640] device veth1_vlan entered promiscuous mode [ 191.237690][ T6810] chnl_net:caif_netlink_parms(): no params data found [ 191.262241][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 191.277935][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.286174][ T6833] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.298318][ T6833] device bridge_slave_0 left promiscuous mode [ 191.304598][ T6833] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.313880][ T6833] device bridge_slave_1 left promiscuous mode [ 191.320318][ T6833] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.330596][ T6833] bond0: (slave bond_slave_0): Releasing backup interface [ 191.352442][ T6833] bond0: (slave bond_slave_1): Releasing backup interface [ 191.404991][ T6833] team0: Port device team_slave_0 removed [ 191.430287][ T6833] team0: Port device team_slave_1 removed [ 191.440146][ T6833] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 191.447988][ T6833] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 191.458363][ T6833] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 191.466012][ T6833] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 191.504202][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.512239][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.528621][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.538329][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.548706][ T6640] device veth0_macvtap entered promiscuous mode [ 191.607009][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.616850][ T6640] device veth1_macvtap entered promiscuous mode [ 191.645423][ T6810] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.652471][ T6810] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.660335][ T6810] device bridge_slave_0 entered promiscuous mode [ 191.671146][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.681922][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.691834][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.702319][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.713208][ T6640] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.753282][ T6810] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.760543][ T6810] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.768728][ T6810] device bridge_slave_1 entered promiscuous mode [ 191.787310][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.795657][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.804773][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.815328][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.825210][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.835666][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.846893][ T6640] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.863569][ T6839] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 191.877261][ T6839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 191.885241][ T6839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 191.898199][ T6839] device bridge_slave_0 left promiscuous mode [ 191.904518][ T6839] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.914226][ T6839] device bridge_slave_1 left promiscuous mode [ 191.921197][ T6839] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.932196][ T6839] bond0: (slave bond_slave_0): Releasing backup interface [ 191.955127][ T6839] bond0: (slave bond_slave_1): Releasing backup interface [ 192.009729][ T6839] team0: Port device team_slave_0 removed [ 192.038513][ T6839] team0: Port device team_slave_1 removed [ 192.047551][ T6839] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 192.055110][ T6839] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 192.064876][ T6839] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 192.072884][ T6839] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 192.103375][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.122770][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.168687][ T6810] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.306533][ T6842] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.358671][ T6842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.395699][ T6842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.573254][ T6810] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.638556][ T6810] team0: Port device team_slave_0 added [ 192.647139][ T6810] team0: Port device team_slave_1 added [ 192.659724][ T6845] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 192.673514][ T6845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.681297][ T6845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.692509][ T6845] device bridge_slave_0 left promiscuous mode [ 192.699111][ T6845] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.708856][ T6845] device bridge_slave_1 left promiscuous mode [ 192.717524][ T6845] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.729297][ T6845] bond0: (slave bond_slave_0): Releasing backup interface [ 192.751558][ T6845] bond0: (slave bond_slave_1): Releasing backup interface [ 192.788711][ T6845] team0: Port device team_slave_0 removed [ 192.815443][ T6845] team0: Port device team_slave_1 removed [ 192.825563][ T6845] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 192.833311][ T6845] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 192.844167][ T6845] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 192.851769][ T6845] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 192.893626][ T1845] device hsr_slave_0 left promiscuous mode [ 192.902758][ T1845] device hsr_slave_1 left promiscuous mode [ 192.927385][ T1845] device hsr_slave_0 left promiscuous mode [ 192.945283][ T1845] device hsr_slave_1 left promiscuous mode [ 192.959126][ T1845] device hsr_slave_0 left promiscuous mode [ 192.971947][ T1845] device hsr_slave_1 left promiscuous mode [ 192.986841][ T1845] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 192.994293][ T1845] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 193.018565][ T1845] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 193.026128][ T1845] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 193.051996][ T1845] device bridge_slave_1 left promiscuous mode [ 193.058245][ T1845] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.086664][ T1845] device bridge_slave_0 left promiscuous mode [ 193.093224][ T1845] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.118818][ T1845] device hsr_slave_0 left promiscuous mode [ 193.135122][ T1845] device hsr_slave_1 left promiscuous mode [ 193.165569][ T1845] device veth1_macvtap left promiscuous mode [ 193.171579][ T1845] device veth0_macvtap left promiscuous mode [ 193.177619][ T1845] device veth1_vlan left promiscuous mode [ 193.183344][ T1845] device veth0_vlan left promiscuous mode [ 193.216052][ T1845] device veth1_macvtap left promiscuous mode [ 193.222123][ T1845] device veth0_macvtap left promiscuous mode [ 193.228263][ T1845] device veth1_vlan left promiscuous mode [ 193.234079][ T1845] device veth0_vlan left promiscuous mode [ 193.266792][ T1845] device veth1_macvtap left promiscuous mode [ 193.272825][ T1845] device veth0_macvtap left promiscuous mode [ 193.279013][ T1845] device veth1_vlan left promiscuous mode [ 193.284856][ T1845] device veth0_vlan left promiscuous mode [ 193.294009][ T1845] device veth1_macvtap left promiscuous mode [ 193.300046][ T1845] device veth0_macvtap left promiscuous mode [ 193.306156][ T1845] device veth1_vlan left promiscuous mode [ 193.311928][ T1845] device veth0_vlan left promiscuous mode [ 193.834356][ T1845] bond0 (unregistering): Released all slaves [ 193.932774][ T1845] bond0 (unregistering): Released all slaves [ 194.010921][ T1845] team0 (unregistering): Port device team_slave_1 removed [ 194.021071][ T1845] team0 (unregistering): Port device team_slave_0 removed [ 194.030637][ T1845] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 194.042172][ T1845] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 194.069178][ T1845] bond0 (unregistering): Released all slaves [ 194.175118][ T1845] bond0 (unregistering): Released all slaves [ 194.217292][ T6810] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.224326][ T6810] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.250455][ T6810] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.267561][ T6847] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 194.277451][ T6847] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.284882][ T6847] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 194.429752][ T6857] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 194.459613][ T6857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.468184][ T6857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 194.515127][ T6810] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.522086][ T6810] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.548131][ T6810] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.618548][ T6864] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 194.649267][ T6864] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.657728][ T6864] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.763327][ T6810] device hsr_slave_0 entered promiscuous mode [ 194.778396][ T6810] device hsr_slave_1 entered promiscuous mode [ 194.792556][ T6810] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.800381][ T6810] Cannot create hsr debugfs directory [ 195.060768][ T6850] chnl_net:caif_netlink_parms(): no params data found [ 195.075169][ T6859] chnl_net:caif_netlink_parms(): no params data found [ 195.095401][ T6810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.126053][ T6810] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.153315][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.160813][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.169840][ T6850] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.176906][ T6850] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.185361][ T6850] device bridge_slave_0 entered promiscuous mode [ 195.192476][ T6850] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.199611][ T6850] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.207788][ T6850] device bridge_slave_1 entered promiscuous mode [ 195.233610][ T6810] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 195.244071][ T6810] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.270101][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.278802][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.287214][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.294230][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.302085][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.310468][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.318860][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.325909][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.333535][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.342244][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.350723][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.359264][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.367682][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.376159][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.384472][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.392766][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.402510][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.410236][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.417954][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.431363][ T6850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.445374][ T6850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.454478][ T6859] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.461564][ T6859] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.469311][ T6859] device bridge_slave_0 entered promiscuous mode [ 195.489067][ T6859] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.496263][ T6859] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.503794][ T6859] device bridge_slave_1 entered promiscuous mode [ 195.520538][ T6850] team0: Port device team_slave_0 added [ 195.527214][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 195.534517][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.561972][ T6850] team0: Port device team_slave_1 added [ 195.577557][ T6850] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.584625][ T6850] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.610823][ T6850] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.623054][ T6859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.633386][ T6810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.642742][ T6919] chnl_net:caif_netlink_parms(): no params data found [ 195.653063][ T6850] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.660106][ T6850] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.686025][ T6850] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.698024][ T6859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.740502][ T6850] device hsr_slave_0 entered promiscuous mode [ 195.748554][ T6850] device hsr_slave_1 entered promiscuous mode [ 195.755616][ T6850] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.763254][ T6850] Cannot create hsr debugfs directory [ 195.782147][ T6859] team0: Port device team_slave_0 added [ 195.788679][ T6859] team0: Port device team_slave_1 added [ 195.805796][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.814312][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.833969][ T6859] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.841042][ T6859] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.866912][ T6859] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.880040][ T6919] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.887098][ T6919] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.894789][ T6919] device bridge_slave_0 entered promiscuous mode [ 195.903904][ T6859] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.910900][ T6859] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.936849][ T6859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.948345][ T6919] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.955469][ T6919] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.963065][ T6919] device bridge_slave_1 entered promiscuous mode [ 195.986613][ T6859] device hsr_slave_0 entered promiscuous mode [ 195.993118][ T6859] device hsr_slave_1 entered promiscuous mode [ 195.999789][ T6859] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.007527][ T6859] Cannot create hsr debugfs directory [ 196.020459][ T6919] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.042490][ T6919] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.061169][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 196.069392][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.081191][ T6810] device veth0_vlan entered promiscuous mode [ 196.109610][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.119112][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.129159][ T6810] device veth1_vlan entered promiscuous mode [ 196.144253][ T6919] team0: Port device team_slave_0 added [ 196.174296][ T6919] team0: Port device team_slave_1 added [ 196.193279][ T6810] device veth0_macvtap entered promiscuous mode [ 196.205877][ T6850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.222824][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 196.234485][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 196.245691][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.254022][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.275075][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 196.284113][ T6810] device veth1_macvtap entered promiscuous mode [ 196.291800][ T6919] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.298845][ T6919] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.324988][ T6919] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.342071][ T6850] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.367907][ T6919] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.374925][ T6919] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.400859][ T6919] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.415291][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.423338][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.432346][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.440214][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.449929][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.458190][ T1914] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.465346][ T1914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.473387][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.482219][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.490686][ T1914] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.497760][ T1914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.505741][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.514313][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.523104][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.531403][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.540099][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.548698][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.558516][ T1914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.572293][ T6810] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 196.582025][ T6850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.592860][ T6850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.616879][ T6859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.624318][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 196.634249][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.642861][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.651028][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.659997][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.668650][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.678862][ T6810] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 196.686362][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.696181][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.711070][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.719003][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.727944][ T6919] device hsr_slave_0 entered promiscuous mode [ 196.734501][ T6919] device hsr_slave_1 entered promiscuous mode [ 196.741093][ T6919] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.748714][ T6919] Cannot create hsr debugfs directory [ 196.762611][ T6859] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.784967][ T6850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.799445][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.807163][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.815223][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.823642][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.832207][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.839229][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.846987][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.855469][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.863756][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.870963][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.879295][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.888102][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.896669][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.905173][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.915786][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.923836][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.931757][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.940123][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.970480][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.979752][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.988401][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.002877][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.015306][ T6859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.050234][ T6988] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 197.062234][ T6988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.070815][ T6988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.082586][ T6988] device bridge_slave_0 left promiscuous mode [ 197.089104][ T6988] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.098847][ T6988] device bridge_slave_1 left promiscuous mode [ 197.105567][ T6988] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.117900][ T6988] bond0: (slave bond_slave_0): Releasing backup interface [ 197.140410][ T6988] bond0: (slave bond_slave_1): Releasing backup interface [ 197.178471][ T6988] team0: Port device team_slave_0 removed [ 197.207000][ T6988] team0: Port device team_slave_1 removed [ 197.216903][ T6988] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 197.224754][ T6988] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 197.234299][ T6988] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 197.242047][ T6988] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:49 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 197.281279][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.298769][ T6988] syz-executor.1 (6988) used greatest stack depth: 9880 bytes left [ 197.318946][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.350969][ T6859] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.495099][ T6994] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 197.551870][ T6994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.575154][ T6994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.786044][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.793510][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.810284][ T6919] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.824584][ T6919] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.831878][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.842390][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.854931][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.865487][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.873791][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.880823][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.888677][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.897169][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.905394][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.912455][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.933502][ T6850] device veth0_vlan entered promiscuous mode [ 197.941506][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.951068][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.959770][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.968618][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.977400][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.986245][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.994665][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.003250][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.011362][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.019902][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.028052][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.036242][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.044339][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.052687][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.060550][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.068268][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.078298][ T6850] device veth1_vlan entered promiscuous mode [ 198.086971][ T6919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.110727][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.118756][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.127584][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.143508][ T6919] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.161208][ T6850] device veth0_macvtap entered promiscuous mode [ 198.168691][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 198.177075][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.186120][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.193516][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.202263][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.211978][ T6850] device veth1_macvtap entered promiscuous mode [ 198.240020][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 198.248096][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.263589][ T6850] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 198.271426][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.279931][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.290608][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.298761][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.310371][ T6850] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 198.330029][ T6859] device veth0_vlan entered promiscuous mode [ 198.338089][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.346073][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.353747][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.362523][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.374032][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.383896][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.396952][ T6859] device veth1_vlan entered promiscuous mode [ 198.447122][ T6859] device veth0_macvtap entered promiscuous mode [ 198.462756][ T6859] device veth1_macvtap entered promiscuous mode [ 198.469616][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.479002][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 198.493381][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.501912][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.510333][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.518663][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 198.566490][ T7038] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 198.581871][ T7038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.589776][ T7038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.600970][ T7038] device bridge_slave_0 left promiscuous mode [ 198.607499][ T7038] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.618354][ T7038] device bridge_slave_1 left promiscuous mode [ 198.624637][ T7038] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.637050][ T7038] bond0: (slave bond_slave_0): Releasing backup interface [ 198.658930][ T7038] bond0: (slave bond_slave_1): Releasing backup interface [ 198.692717][ T7038] team0: Port device team_slave_0 removed [ 198.720442][ T7038] team0: Port device team_slave_1 removed [ 198.730917][ T7038] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 198.738824][ T7038] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 198.748453][ T7038] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 198.756407][ T7038] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 198.810093][ T6859] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 198.829478][ T6859] batman_adv: batadv0: Interface activated: batadv_slave_1 23:17:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:51 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 198.864307][ T6919] device veth0_vlan entered promiscuous mode [ 198.941027][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.961653][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.981111][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.007973][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.033555][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.053182][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.135247][ T7049] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 199.182184][ T7049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.216769][ T7049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:51 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 199.398207][ T6919] device veth1_vlan entered promiscuous mode [ 199.446667][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.454362][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.499913][ T7075] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 199.530158][ T7075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.538740][ T7075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.690577][ T6919] device veth0_macvtap entered promiscuous mode [ 199.720646][ T7103] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 199.743324][ T7103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.754006][ T7103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.772953][ T7103] device bridge_slave_0 left promiscuous mode [ 199.779823][ T7103] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.794697][ T7103] device bridge_slave_1 left promiscuous mode [ 199.801367][ T7103] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.818720][ T7103] bond0: (slave bond_slave_0): Releasing backup interface [ 199.856897][ T7103] bond0: (slave bond_slave_1): Releasing backup interface [ 199.899854][ T7103] team0: Port device team_slave_0 removed [ 199.928129][ T7103] team0: Port device team_slave_1 removed [ 199.936684][ T7103] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:17:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 199.944635][ T7103] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 199.954539][ T7103] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 199.962230][ T7103] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 199.983902][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.992415][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.008901][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.018421][ T6919] device veth1_macvtap entered promiscuous mode [ 200.068971][ T7128] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 200.083019][ T7128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.091170][ T7128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 200.174930][ T6919] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.182944][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.191735][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.202917][ T7052] chnl_net:caif_netlink_parms(): no params data found [ 200.218725][ T5877] device hsr_slave_0 left promiscuous mode [ 200.224667][ T5877] device hsr_slave_1 left promiscuous mode [ 200.231820][ T5877] device hsr_slave_0 left promiscuous mode [ 200.238665][ T5877] device hsr_slave_1 left promiscuous mode [ 200.246310][ T5877] device hsr_slave_0 left promiscuous mode [ 200.252365][ T5877] device hsr_slave_1 left promiscuous mode [ 200.262959][ T5877] device veth1_macvtap left promiscuous mode [ 200.268993][ T5877] device veth0_macvtap left promiscuous mode [ 200.275012][ T5877] device veth1_vlan left promiscuous mode [ 200.280790][ T5877] device veth0_vlan left promiscuous mode [ 200.287072][ T5877] device veth1_macvtap left promiscuous mode [ 200.293114][ T5877] device veth0_macvtap left promiscuous mode [ 200.299206][ T5877] device veth1_vlan left promiscuous mode [ 200.304973][ T5877] device veth0_vlan left promiscuous mode [ 200.310923][ T5877] device veth1_macvtap left promiscuous mode [ 200.316944][ T5877] device veth0_macvtap left promiscuous mode [ 200.322916][ T5877] device veth1_vlan left promiscuous mode [ 200.328654][ T5877] device veth0_vlan left promiscuous mode [ 200.570666][ T5877] bond0 (unregistering): Released all slaves [ 200.657806][ T5877] bond0 (unregistering): Released all slaves [ 200.747123][ T5877] bond0 (unregistering): Released all slaves [ 200.810699][ T6919] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.818175][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.826949][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.887483][ T7052] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.894525][ T7052] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.902729][ T7052] device bridge_slave_0 entered promiscuous mode [ 200.925071][ T7052] bridge0: port 2(bridge_slave_1) entered blocking state 23:17:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:53 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 200.932548][ T7052] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.948910][ T7052] device bridge_slave_1 entered promiscuous mode [ 201.017725][ T7148] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 201.066806][ T7148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.081519][ T7148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.253824][ T7150] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 201.280564][ T7150] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.290273][ T7150] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.469172][ T7052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.488364][ T7052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.544956][ T7052] team0: Port device team_slave_0 added [ 201.551599][ T7052] team0: Port device team_slave_1 added [ 201.577778][ T7131] chnl_net:caif_netlink_parms(): no params data found [ 201.610023][ T7052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.616995][ T7052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.642995][ T7052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.655680][ T7052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.662658][ T7052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.688618][ T7052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.719045][ T7131] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.726099][ T7131] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.735823][ T7131] device bridge_slave_0 entered promiscuous mode [ 201.748419][ T7052] device hsr_slave_0 entered promiscuous mode [ 201.755175][ T7052] device hsr_slave_1 entered promiscuous mode [ 201.761547][ T7131] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.768626][ T7131] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.776308][ T7131] device bridge_slave_1 entered promiscuous mode [ 201.798146][ T7131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.808803][ T7131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.839268][ T7131] team0: Port device team_slave_0 added [ 201.857326][ T7131] team0: Port device team_slave_1 added [ 201.880708][ T7131] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.887692][ T7131] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.913796][ T7131] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.931498][ T7131] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.938493][ T7131] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.964381][ T7131] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.991335][ T7131] device hsr_slave_0 entered promiscuous mode [ 201.998004][ T7131] device hsr_slave_1 entered promiscuous mode [ 202.004294][ T7131] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 202.011890][ T7131] Cannot create hsr debugfs directory [ 202.036737][ T7052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.053934][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 202.066420][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.074155][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.084898][ T7052] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.095801][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.104130][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.112504][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.119574][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.128339][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.137817][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.147068][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.155655][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.162673][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.173977][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.182526][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.198145][ T7052] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.208648][ T7052] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.224399][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.233559][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.243758][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.252508][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.273017][ T7052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.280389][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.295480][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.303442][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.310963][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.330958][ T7131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.344632][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.354335][ T7131] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.366666][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.375335][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.382357][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.398785][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.407561][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.416089][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.423194][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.433612][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.442357][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.457767][ T7131] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.468260][ T7131] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.488431][ T7131] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.569786][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.582333][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.597191][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.608580][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.617391][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.626997][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.635286][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.659273][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.696936][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.705236][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.715928][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.723469][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.731387][ T7052] device veth0_vlan entered promiscuous mode [ 202.743766][ T7131] device veth0_vlan entered promiscuous mode [ 202.756164][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.764318][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.773318][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.780969][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.793086][ T7052] device veth1_vlan entered promiscuous mode [ 202.809054][ T7131] device veth1_vlan entered promiscuous mode [ 202.829071][ T7131] device veth0_macvtap entered promiscuous mode [ 202.837303][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 202.845305][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 202.853007][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 202.860956][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 202.868822][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.877505][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.897641][ T7131] device veth1_macvtap entered promiscuous mode [ 202.932966][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 202.940990][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.949001][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.957346][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.973397][ T7131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.983989][ T7131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.994816][ T7131] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.002525][ T7052] device veth0_macvtap entered promiscuous mode [ 203.016700][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.024566][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.033105][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.042914][ T7131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.053365][ T7131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.064363][ T7131] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.073893][ T7197] chnl_net:caif_netlink_parms(): no params data found [ 203.082396][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.090924][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.100110][ T7052] device veth1_macvtap entered promiscuous mode [ 203.140261][ T7052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.150784][ T7052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.160602][ T7052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 203.171038][ T7052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.181924][ T7052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.205918][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.213742][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.222337][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.232290][ T7052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.242883][ T7052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.252706][ T7052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.263113][ T7052] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.274055][ T7052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.290620][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.299262][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.343851][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.356928][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.364648][ T7221] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.377784][ T7221] device bridge_slave_0 left promiscuous mode [ 203.384094][ T7221] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.397003][ T7221] device bridge_slave_1 left promiscuous mode [ 203.403293][ T7221] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.413653][ T7221] bond0: (slave bond_slave_0): Releasing backup interface [ 203.435976][ T7221] bond0: (slave bond_slave_1): Releasing backup interface [ 203.473746][ T7221] team0: Port device team_slave_0 removed [ 203.497886][ T7221] team0: Port device team_slave_1 removed [ 203.507949][ T7221] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 203.516240][ T7221] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 203.528468][ T7221] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 203.536261][ T7221] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 203.554795][ T7197] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.561889][ T7197] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.570965][ T7197] device bridge_slave_0 entered promiscuous mode [ 203.586979][ T7197] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.594240][ T7197] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.602022][ T7197] device bridge_slave_1 entered promiscuous mode [ 203.674471][ T7197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.685597][ T7197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.704835][ T7197] team0: Port device team_slave_0 added [ 203.719248][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.731231][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.740321][ T7224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.751521][ T7224] device bridge_slave_0 left promiscuous mode [ 203.758099][ T7224] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.769041][ T7224] device bridge_slave_1 left promiscuous mode [ 203.775401][ T7224] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.787156][ T7224] bond0: (slave bond_slave_0): Releasing backup interface [ 203.808285][ T7224] bond0: (slave bond_slave_1): Releasing backup interface [ 203.844145][ T7224] team0: Port device team_slave_0 removed [ 203.870498][ T7224] team0: Port device team_slave_1 removed [ 203.880454][ T7224] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 203.888424][ T7224] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 203.898094][ T7224] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 203.905934][ T7224] batman_adv: batadv0: Removing interface: batadv_slave_1 23:17:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:56 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 203.949460][ T7197] team0: Port device team_slave_1 added [ 204.041743][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.090764][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.110240][ T7226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 204.271437][ T7228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.329102][ T7228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.346285][ T7228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:56 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 204.529915][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.578734][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.599437][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 204.710558][ T7232] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.730547][ T7232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.745771][ T7232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.781906][ T7197] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.788949][ T7197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.815102][ T7197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.915027][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.960887][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.970779][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.046535][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 205.061596][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.070184][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.103216][ T7197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.110223][ T7197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.136278][ T7197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 205.165691][ T7197] device hsr_slave_0 entered promiscuous mode [ 205.172121][ T7197] device hsr_slave_1 entered promiscuous mode [ 205.180437][ T7197] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 205.188040][ T7197] Cannot create hsr debugfs directory [ 205.266800][ T7197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.284725][ T7197] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.292783][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.300782][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.309972][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.319790][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.327960][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.335071][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.343013][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.353864][ T5877] device hsr_slave_0 left promiscuous mode [ 205.360690][ T5877] device hsr_slave_1 left promiscuous mode [ 205.367048][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 205.374439][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 205.382320][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 205.389763][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 205.397505][ T5877] device bridge_slave_1 left promiscuous mode [ 205.403664][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.412949][ T5877] device bridge_slave_0 left promiscuous mode [ 205.419142][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.428722][ T5877] device hsr_slave_0 left promiscuous mode [ 205.434625][ T5877] device hsr_slave_1 left promiscuous mode [ 205.443374][ T5877] device hsr_slave_0 left promiscuous mode [ 205.450912][ T5877] device hsr_slave_1 left promiscuous mode [ 205.462379][ T5877] device veth1_macvtap left promiscuous mode [ 205.468418][ T5877] device veth0_macvtap left promiscuous mode [ 205.474450][ T5877] device veth1_vlan left promiscuous mode [ 205.480354][ T5877] device veth0_vlan left promiscuous mode [ 205.488821][ T5877] device veth1_macvtap left promiscuous mode [ 205.494847][ T5877] device veth0_macvtap left promiscuous mode [ 205.500875][ T5877] device veth1_vlan left promiscuous mode [ 205.506646][ T5877] device veth0_vlan left promiscuous mode [ 205.518447][ T5877] device veth1_macvtap left promiscuous mode [ 205.524470][ T5877] device veth0_macvtap left promiscuous mode [ 205.530496][ T5877] device veth1_vlan left promiscuous mode [ 205.536236][ T5877] device veth0_vlan left promiscuous mode [ 205.723277][ T5877] team0 (unregistering): Port device team_slave_1 removed [ 205.733171][ T5877] team0 (unregistering): Port device team_slave_0 removed [ 205.742631][ T5877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 205.757083][ T5877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 205.784387][ T5877] bond0 (unregistering): Released all slaves [ 205.871056][ T5877] bond0 (unregistering): Released all slaves [ 205.955677][ T5877] bond0 (unregistering): Released all slaves [ 206.009261][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.017799][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.027583][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.034598][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.050972][ T7197] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 206.061388][ T7197] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.079300][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.089895][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.099203][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.110247][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.118893][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.128410][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.136839][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.145140][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.153392][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.161984][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.175659][ T7197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.182988][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.191143][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.198689][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.208074][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.278285][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.286975][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.330418][ T7239] chnl_net:caif_netlink_parms(): no params data found [ 206.381269][ T7197] device veth0_vlan entered promiscuous mode [ 206.391163][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.400663][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.409170][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 206.420675][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.428422][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.455218][ T7197] device veth1_vlan entered promiscuous mode [ 206.462956][ T7239] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.470185][ T7239] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.478132][ T7239] device bridge_slave_0 entered promiscuous mode [ 206.487390][ T7239] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.494413][ T7239] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.501944][ T7239] device bridge_slave_1 entered promiscuous mode [ 206.523072][ T7239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.542866][ T7239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.557056][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.564573][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.572436][ T7245] device bridge_slave_0 entered promiscuous mode [ 206.579678][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.587279][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.594934][ T7245] device bridge_slave_1 entered promiscuous mode [ 206.615344][ T7239] team0: Port device team_slave_0 added [ 206.622721][ T7245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 206.632965][ T7245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 206.645528][ T7239] team0: Port device team_slave_1 added [ 206.651380][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 206.660714][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 206.670078][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.678429][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.700004][ T7197] device veth0_macvtap entered promiscuous mode [ 206.707363][ T7245] team0: Port device team_slave_0 added [ 206.719497][ T7197] device veth1_macvtap entered promiscuous mode [ 206.726867][ T7245] team0: Port device team_slave_1 added [ 206.736919][ T7239] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.743842][ T7239] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.769871][ T7239] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 206.788488][ T7239] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.795514][ T7239] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.821812][ T7239] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.832857][ T7245] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.839895][ T7245] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.865906][ T7245] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 206.879503][ T7197] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.888030][ T7245] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.895019][ T7245] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.920902][ T7245] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.932387][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.940242][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.948635][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.956900][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.976643][ T7197] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.990208][ T7239] device hsr_slave_0 entered promiscuous mode [ 206.996591][ T7239] device hsr_slave_1 entered promiscuous mode [ 207.002923][ T7239] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 207.010646][ T7239] Cannot create hsr debugfs directory [ 207.022176][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.030685][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.045276][ T7245] device hsr_slave_0 entered promiscuous mode [ 207.051781][ T7245] device hsr_slave_1 entered promiscuous mode [ 207.058244][ T7245] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 207.065947][ T7245] Cannot create hsr debugfs directory 23:17:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:17:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 207.130966][ T7282] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 207.211981][ T7285] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.238691][ T7285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.250918][ T7285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 207.354427][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.366498][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.373875][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 207.404995][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.436072][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.444369][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:17:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 207.489414][ T7239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.535604][ T7290] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.549710][ T7290] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.558743][ T7290] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.607446][ T7292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.621697][ T7292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.631565][ T7292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.669300][ T7239] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.684131][ T7294] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 207.700976][ T7294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.708700][ T7294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.735818][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.755191][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.782437][ T7239] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 207.792859][ T7239] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.806442][ T7245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.813932][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.822465][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.830746][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.837778][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.845809][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.854285][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.862569][ T4580] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.869659][ T4580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.877438][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.886443][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.894938][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.903298][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.911695][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.920136][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.928652][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.936806][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.945000][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.953081][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.966368][ T7239] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.979610][ T7245] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.993222][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.001110][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.009217][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.016709][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 208.024158][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 208.031631][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.039217][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.046710][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.055097][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.063502][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.070592][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.079000][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.089296][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.097844][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.107340][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.114358][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.126288][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.141276][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.150493][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.158918][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.167503][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.175980][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.184347][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.192603][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.200731][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.208907][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.217987][ T7245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.228167][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.260029][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.268604][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.279704][ T7245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 208.288225][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 208.295851][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 208.341086][ T7239] device veth0_vlan entered promiscuous mode [ 208.349708][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.358017][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.376805][ T7239] device veth1_vlan entered promiscuous mode [ 208.385255][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.392893][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.400570][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.408413][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.417820][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.426344][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.439350][ T7239] device veth0_macvtap entered promiscuous mode [ 208.455322][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.463709][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.472278][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.481158][ T7239] device veth1_macvtap entered promiscuous mode [ 208.492780][ T7239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.503223][ T7239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.513868][ T7239] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 208.529839][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.537803][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.546472][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.559594][ T7239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.570046][ T7239] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.580764][ T7239] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.592080][ T7245] device veth0_vlan entered promiscuous mode [ 208.598987][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.607605][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.616149][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.624192][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.640348][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.648188][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.659455][ T7245] device veth1_vlan entered promiscuous mode [ 208.680427][ T7245] device veth0_macvtap entered promiscuous mode [ 208.688091][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.700551][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 208.708524][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.717016][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.738636][ T7321] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 208.749834][ T7321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 208.757821][ T7321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 208.768872][ T7321] device bridge_slave_0 left promiscuous mode [ 208.775384][ T7321] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.786022][ T7321] device bridge_slave_1 left promiscuous mode [ 208.792198][ T7321] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.802413][ T7321] bond0: (slave bond_slave_0): Releasing backup interface [ 208.822114][ T7321] bond0: (slave bond_slave_1): Releasing backup interface [ 208.857328][ T7321] team0: Port device team_slave_0 removed [ 208.900718][ T7321] team0: Port device team_slave_1 removed [ 208.908093][ T7321] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 208.915666][ T7321] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 208.925374][ T7321] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 208.932923][ T7321] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 208.952057][ T7245] device veth1_macvtap entered promiscuous mode [ 208.960194][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.968414][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.994275][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.004794][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.015710][ T7245] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.058594][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.067173][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.076673][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.087218][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.098243][ T7245] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 209.121962][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.132216][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.182585][ T7324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 209.197924][ T7324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.206521][ T7324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.216842][ T7324] device bridge_slave_0 left promiscuous mode [ 209.223270][ T7324] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.233581][ T7324] device bridge_slave_1 left promiscuous mode [ 209.240061][ T7324] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.250618][ T7324] bond0: (slave bond_slave_0): Releasing backup interface [ 209.273685][ T7324] bond0: (slave bond_slave_1): Releasing backup interface [ 209.309400][ T7324] team0: Port device team_slave_0 removed [ 209.339540][ T7324] team0: Port device team_slave_1 removed [ 209.350015][ T7324] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 209.359136][ T7324] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 209.368843][ T7324] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 209.376416][ T7324] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 209.403073][ T5877] device hsr_slave_0 left promiscuous mode [ 209.409215][ T5877] device hsr_slave_1 left promiscuous mode [ 209.416884][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 209.424283][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 209.432776][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 209.440331][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 209.459790][ T5877] device bridge_slave_1 left promiscuous mode [ 209.466010][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.476655][ T5877] device bridge_slave_0 left promiscuous mode [ 209.482834][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.492878][ T5877] device hsr_slave_0 left promiscuous mode [ 209.502650][ T5877] device hsr_slave_1 left promiscuous mode [ 209.512754][ T5877] device veth1_macvtap left promiscuous mode [ 209.518830][ T5877] device veth0_macvtap left promiscuous mode [ 209.524866][ T5877] device veth1_vlan left promiscuous mode [ 209.530667][ T5877] device veth0_vlan left promiscuous mode [ 209.537074][ T5877] device veth1_macvtap left promiscuous mode [ 209.543147][ T5877] device veth0_macvtap left promiscuous mode [ 209.549260][ T5877] device veth1_vlan left promiscuous mode [ 209.554997][ T5877] device veth0_vlan left promiscuous mode [ 209.814191][ T5877] team0 (unregistering): Port device team_slave_1 removed [ 209.824442][ T5877] team0 (unregistering): Port device team_slave_0 removed [ 209.834945][ T5877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 209.858591][ T5877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 209.914539][ T5877] bond0 (unregistering): Released all slaves [ 210.077364][ T5877] bond0 (unregistering): Released all slaves [ 210.271791][ T7326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.294635][ T7326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.302407][ T7326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 210.331570][ T7330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.343930][ T7330] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.353518][ T7330] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 210.380306][ T7329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.390810][ T7329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.398829][ T7329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 210.478054][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.505248][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.513337][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 210.636933][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.666312][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.680422][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 210.778953][ T7336] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.807535][ T7336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.820287][ T7336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.914360][ T7338] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 210.941474][ T7338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.949804][ T7338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.173643][ T7340] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 211.187294][ T7340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.195360][ T7340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.312233][ T7342] chnl_net:caif_netlink_parms(): no params data found [ 211.349840][ T7342] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.356994][ T7342] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.370111][ T7342] device bridge_slave_0 entered promiscuous mode [ 211.377505][ T7342] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.384524][ T7342] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.393387][ T7342] device bridge_slave_1 entered promiscuous mode [ 211.411803][ T7342] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.422111][ T7342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.448349][ T7342] team0: Port device team_slave_0 added [ 211.454995][ T7342] team0: Port device team_slave_1 added [ 211.471819][ T7342] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.478847][ T7342] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.504853][ T7342] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.517871][ T7342] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.524829][ T7342] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.550900][ T7342] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.574182][ T7342] device hsr_slave_0 entered promiscuous mode [ 211.581053][ T7342] device hsr_slave_1 entered promiscuous mode [ 211.587871][ T7342] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 211.595705][ T7342] Cannot create hsr debugfs directory [ 211.660038][ T7342] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.667098][ T7342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.674421][ T7342] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.681520][ T7342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.699583][ T7356] chnl_net:caif_netlink_parms(): no params data found [ 211.742766][ T7342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.760303][ T7342] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.773840][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.781848][ T1918] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.790608][ T1918] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.807700][ T7356] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.814769][ T7356] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.822348][ T7356] device bridge_slave_0 entered promiscuous mode [ 211.829574][ T7356] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.836740][ T7356] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.844484][ T7356] device bridge_slave_1 entered promiscuous mode [ 211.856674][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.865076][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.872092][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.879895][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.888895][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.897210][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.913381][ T7342] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 211.923911][ T7342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.946032][ T7356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.957184][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.965643][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.974067][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.982507][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.995745][ T7342] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.002854][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.010303][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.017733][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.025378][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.034447][ T7356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.058258][ T7356] team0: Port device team_slave_0 added [ 212.064947][ T7356] team0: Port device team_slave_1 added [ 212.082407][ T7356] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.089512][ T7356] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.115424][ T7356] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.126716][ T7356] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.133717][ T7356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.159851][ T7356] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.176587][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.235170][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.243495][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.252458][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.272129][ T7342] device veth0_vlan entered promiscuous mode [ 212.288365][ T7356] device hsr_slave_0 entered promiscuous mode [ 212.295094][ T7356] device hsr_slave_1 entered promiscuous mode [ 212.301563][ T7356] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.310629][ T7356] Cannot create hsr debugfs directory [ 212.318452][ T7342] device veth1_vlan entered promiscuous mode [ 212.334734][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.343094][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.376099][ T7342] device veth0_macvtap entered promiscuous mode [ 212.392520][ T7342] device veth1_macvtap entered promiscuous mode [ 212.433014][ T7342] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 212.444645][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.452695][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.460702][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.469060][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.495750][ T7342] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 212.504838][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.513157][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.561031][ T7383] chnl_net:caif_netlink_parms(): no params data found [ 212.592507][ T7356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.619912][ T7356] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.629569][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.639248][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.661211][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 212.672717][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 212.680752][ T7399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 212.691225][ T7399] device bridge_slave_0 left promiscuous mode [ 212.697696][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.707658][ T7399] device bridge_slave_1 left promiscuous mode [ 212.713957][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.725229][ T7399] bond0: (slave bond_slave_0): Releasing backup interface [ 212.744413][ T7399] bond0: (slave bond_slave_1): Releasing backup interface [ 212.791176][ T7399] team0: Port device team_slave_0 removed [ 212.818245][ T7399] team0: Port device team_slave_1 removed [ 212.826805][ T7399] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 212.834924][ T7399] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 212.844358][ T7399] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 212.852207][ T7399] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 212.876308][ T7383] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.883380][ T7383] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.891105][ T7383] device bridge_slave_0 entered promiscuous mode [ 212.903122][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.911771][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.919921][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.927106][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.935062][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.943513][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.951736][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.958749][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.966847][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.984711][ T7383] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.991752][ T7383] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.999435][ T7383] device bridge_slave_1 entered promiscuous mode [ 213.022126][ T7356] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 213.032488][ T7356] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.044310][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.056618][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.065393][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.073676][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.083588][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.091874][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.100496][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.108726][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.141543][ T7356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.150085][ T7383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 213.159309][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.168668][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.177561][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.184984][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.194140][ T7383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.226239][ T7383] team0: Port device team_slave_0 added [ 213.232657][ T7383] team0: Port device team_slave_1 added [ 213.252426][ T7383] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.259496][ T7383] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.285817][ T7383] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.305930][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.314386][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.323264][ T7383] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.330279][ T7383] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.356246][ T7383] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.370660][ T5877] device hsr_slave_0 left promiscuous mode [ 213.377458][ T5877] device hsr_slave_1 left promiscuous mode [ 213.385482][ T5877] device hsr_slave_0 left promiscuous mode [ 213.391543][ T5877] device hsr_slave_1 left promiscuous mode [ 213.401484][ T5877] device veth1_macvtap left promiscuous mode [ 213.407554][ T5877] device veth0_macvtap left promiscuous mode [ 213.413558][ T5877] device veth1_vlan left promiscuous mode [ 213.419476][ T5877] device veth0_vlan left promiscuous mode [ 213.427180][ T5877] device veth1_macvtap left promiscuous mode [ 213.433200][ T5877] device veth0_macvtap left promiscuous mode [ 213.439284][ T5877] device veth1_vlan left promiscuous mode [ 213.445015][ T5877] device veth0_vlan left promiscuous mode [ 213.587381][ T5877] bond0 (unregistering): Released all slaves [ 213.675309][ T5877] bond0 (unregistering): Released all slaves [ 213.733226][ T7383] device hsr_slave_0 entered promiscuous mode [ 213.739972][ T7383] device hsr_slave_1 entered promiscuous mode [ 213.746392][ T7383] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.753914][ T7383] Cannot create hsr debugfs directory [ 213.764655][ T7356] device veth0_vlan entered promiscuous mode [ 213.777218][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.785356][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.793863][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.801723][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.816128][ T7356] device veth1_vlan entered promiscuous mode [ 213.838604][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 213.847385][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 213.855288][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.863534][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.874121][ T7356] device veth0_macvtap entered promiscuous mode [ 213.885122][ T7356] device veth1_macvtap entered promiscuous mode [ 213.903786][ T7356] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.911852][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.919893][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.927630][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.936017][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.946394][ T7356] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.958900][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.967723][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.980958][ T7383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.003517][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.011332][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.022015][ T7383] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.031141][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.033384][ T7415] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 23:18:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 214.040095][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.057176][ T2004] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.064200][ T2004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.116828][ T7417] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.142039][ T7417] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.150348][ T7417] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.239546][ T7383] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.249937][ T7383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.273589][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:18:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 214.283792][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.297532][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.311694][ T1969] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.318809][ T1969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.327700][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.336810][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.346081][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.354561][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.363307][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.373192][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.381935][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.391870][ T1969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.431752][ T7419] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.457390][ T7419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.465757][ T7419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 214.599544][ T7421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.630287][ T7421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.640350][ T7421] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 214.783602][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.798415][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.806103][ T7423] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 214.849650][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.857598][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.891998][ T7425] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.905447][ T7425] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.913149][ T7425] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.980379][ T7427] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 214.996469][ T7427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.004086][ T7427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.088132][ T7429] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 215.102354][ T7429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.110270][ T7429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.149460][ T7383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.167510][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.174941][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.221896][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.231465][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.287943][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.296239][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.306896][ T7383] device veth0_vlan entered promiscuous mode [ 215.315047][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.322560][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.332193][ T7383] device veth1_vlan entered promiscuous mode [ 215.346656][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.355676][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.365147][ T7383] device veth0_macvtap entered promiscuous mode [ 215.373076][ T7383] device veth1_macvtap entered promiscuous mode [ 215.384247][ T7383] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 215.394777][ T7383] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.406564][ T7383] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 215.415735][ T7383] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 215.426184][ T7383] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 215.437569][ T7383] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.445199][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 215.453180][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.461206][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.469588][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.478058][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.486530][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.530891][ T7444] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 215.543532][ T7444] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.552295][ T7444] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.563869][ T7444] device bridge_slave_0 left promiscuous mode [ 215.570297][ T7444] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.580244][ T7444] device bridge_slave_1 left promiscuous mode [ 215.586592][ T7444] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.597682][ T7444] bond0: (slave bond_slave_0): Releasing backup interface [ 215.618045][ T7444] bond0: (slave bond_slave_1): Releasing backup interface [ 215.666782][ T7444] team0: Port device team_slave_0 removed [ 215.699301][ T7444] team0: Port device team_slave_1 removed [ 215.706840][ T7444] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 215.714433][ T7444] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 215.729066][ T7444] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 215.736725][ T7444] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:08 executing program 5: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 215.892212][ T7447] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 215.942406][ T7447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.959524][ T7447] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 216.185032][ T7450] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.237162][ T7450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.257314][ T7450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:08 executing program 5: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 216.343981][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.364406][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.372413][ T7451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.501788][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.516608][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.524188][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.589032][ T7458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 216.602375][ T7458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.610270][ T7458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.755001][ T7452] chnl_net:caif_netlink_parms(): no params data found [ 216.786865][ T7452] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.793901][ T7452] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.801574][ T7452] device bridge_slave_0 entered promiscuous mode [ 216.812659][ T7452] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.819715][ T7452] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.828479][ T7452] device bridge_slave_1 entered promiscuous mode [ 216.844361][ T7452] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.861332][ T7452] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.878635][ T7452] team0: Port device team_slave_0 added [ 216.887975][ T7452] team0: Port device team_slave_1 added [ 216.910063][ T7452] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.917042][ T7452] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.943056][ T7452] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 216.954492][ T7452] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.961487][ T7452] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.987451][ T7452] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.015261][ T7452] device hsr_slave_0 entered promiscuous mode [ 217.021661][ T7452] device hsr_slave_1 entered promiscuous mode [ 217.028152][ T7452] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 217.036237][ T7452] Cannot create hsr debugfs directory [ 217.071970][ T7452] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.079232][ T7452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.086551][ T7452] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.093606][ T7452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.123445][ T7452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.133639][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.141891][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.149870][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.161784][ T7452] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.170321][ T5877] device hsr_slave_0 left promiscuous mode [ 217.176592][ T5877] device hsr_slave_1 left promiscuous mode [ 217.182794][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 217.190246][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 217.198143][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 217.205561][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 217.213160][ T5877] device bridge_slave_1 left promiscuous mode [ 217.219289][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.226738][ T5877] device bridge_slave_0 left promiscuous mode [ 217.232889][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.241711][ T5877] device hsr_slave_0 left promiscuous mode [ 217.248953][ T5877] device hsr_slave_1 left promiscuous mode [ 217.257589][ T5877] device veth1_macvtap left promiscuous mode [ 217.263670][ T5877] device veth0_macvtap left promiscuous mode [ 217.269712][ T5877] device veth1_vlan left promiscuous mode [ 217.275471][ T5877] device veth0_vlan left promiscuous mode [ 217.283075][ T5877] device veth1_macvtap left promiscuous mode [ 217.289067][ T5877] device veth0_macvtap left promiscuous mode [ 217.295075][ T5877] device veth1_vlan left promiscuous mode [ 217.300849][ T5877] device veth0_vlan left promiscuous mode [ 217.474756][ T5877] team0 (unregistering): Port device team_slave_1 removed [ 217.484410][ T5877] team0 (unregistering): Port device team_slave_0 removed [ 217.494104][ T5877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 217.505686][ T5877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 217.534023][ T5877] bond0 (unregistering): Released all slaves [ 217.635369][ T5877] bond0 (unregistering): Released all slaves [ 217.673438][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.682343][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.689463][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.697185][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.705437][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.712652][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.725612][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.734341][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.750692][ T7452] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 217.761089][ T7452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.773430][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.781628][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.790203][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.798433][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.807062][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.815249][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.823245][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.831599][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.841673][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.849785][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.877420][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.885947][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.905539][ T7452] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.921158][ T7471] chnl_net:caif_netlink_parms(): no params data found [ 217.955941][ T7471] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.962993][ T7471] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.970916][ T7471] device bridge_slave_0 entered promiscuous mode [ 217.978146][ T7471] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.985199][ T7471] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.992856][ T7471] device bridge_slave_1 entered promiscuous mode [ 218.011579][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.020038][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.030221][ T7471] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.040511][ T7471] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.059029][ T7471] team0: Port device team_slave_0 added [ 218.065762][ T7471] team0: Port device team_slave_1 added [ 218.080406][ T7452] device veth0_vlan entered promiscuous mode [ 218.089522][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.097820][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.110132][ T7471] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 218.117091][ T7471] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.143275][ T7471] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 218.154113][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.162767][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.170979][ T7471] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 218.177988][ T7471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.203944][ T7471] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 218.227669][ T7452] device veth1_vlan entered promiscuous mode [ 218.236142][ T7471] device hsr_slave_0 entered promiscuous mode [ 218.242601][ T7471] device hsr_slave_1 entered promiscuous mode [ 218.248971][ T7471] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 218.257548][ T7471] Cannot create hsr debugfs directory [ 218.271830][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.279730][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.288265][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.296599][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.311599][ T7452] device veth0_macvtap entered promiscuous mode [ 218.324201][ T7452] device veth1_macvtap entered promiscuous mode [ 218.341333][ T7452] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.348756][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.356957][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.364658][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.373602][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.384362][ T7452] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.392034][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.400684][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.468967][ T7499] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 218.489259][ T7499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.497213][ T7499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.508044][ T7499] device bridge_slave_0 left promiscuous mode [ 218.514294][ T7499] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.523613][ T7499] device bridge_slave_1 left promiscuous mode [ 218.529885][ T7499] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.539996][ T7499] bond0: (slave bond_slave_0): Releasing backup interface [ 218.561247][ T7499] bond0: (slave bond_slave_1): Releasing backup interface [ 218.593461][ T7499] team0: Port device team_slave_0 removed [ 218.618425][ T7499] team0: Port device team_slave_1 removed [ 218.629324][ T7499] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:11 executing program 5: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 218.637085][ T7499] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 218.646440][ T7499] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 218.653970][ T7499] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 218.674116][ T7471] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.723355][ T7471] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.780132][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 218.829793][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.846719][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 219.067309][ T7505] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.112418][ T7505] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.133598][ T7505] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 219.195000][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.202691][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.249780][ T7504] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.277418][ T7504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.285781][ T7504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.336887][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.358109][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.366966][ T7507] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.425719][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.440933][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.449703][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.522268][ T7511] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 219.535758][ T7511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.543398][ T7511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.589264][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.597756][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.607187][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.614229][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.622090][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.630645][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.639135][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.646194][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.653979][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.662919][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.671629][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.685398][ T7471] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.695880][ T7471] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.707379][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.716767][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.725113][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.733547][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.742266][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.750425][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.758796][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.766944][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.775181][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.782989][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.800462][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.807916][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.817274][ T7471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.863047][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.871746][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.910181][ T7471] device veth0_vlan entered promiscuous mode [ 219.917215][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.925491][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.936330][ T7471] device veth1_vlan entered promiscuous mode [ 219.947724][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.955403][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.962986][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 219.978346][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 219.987290][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.995945][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.005874][ T7471] device veth0_macvtap entered promiscuous mode [ 220.013737][ T7471] device veth1_macvtap entered promiscuous mode [ 220.024518][ T7471] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 220.031923][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.040229][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.048049][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.056655][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.068887][ T7471] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.077157][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.085905][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.123842][ T7526] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 220.142486][ T7526] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.153392][ T7526] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.162244][ T7526] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.172410][ T7526] device bridge_slave_0 left promiscuous mode [ 220.179090][ T7526] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.193353][ T7526] device bridge_slave_1 left promiscuous mode [ 220.200233][ T7526] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.217116][ T7526] bond0: (slave bond_slave_0): Releasing backup interface [ 220.253368][ T7526] bond0: (slave bond_slave_1): Releasing backup interface [ 220.315218][ T7526] team0: Port device team_slave_0 removed [ 220.343295][ T7526] team0: Port device team_slave_1 removed 23:18:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:12 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 220.359293][ T7526] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 220.366933][ T7526] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 220.377157][ T7526] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 220.384596][ T7526] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 220.492735][ T7535] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.509786][ T7535] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.518156][ T7535] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 220.576809][ T7537] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.601135][ T7537] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.609194][ T7537] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 220.657666][ T7540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.688193][ T7540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.696090][ T7540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:13 executing program 0: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 220.762842][ T7539] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.779002][ T7539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.786891][ T7539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.859473][ T7542] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.878557][ T7542] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.886122][ T7542] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.922102][ T7544] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 220.944450][ T7544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.952244][ T7544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.018829][ T7546] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 221.032645][ T7546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.040924][ T7546] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.183977][ T7528] chnl_net:caif_netlink_parms(): no params data found [ 221.198345][ T5877] device hsr_slave_0 left promiscuous mode [ 221.204395][ T5877] device hsr_slave_1 left promiscuous mode [ 221.212501][ T5877] device veth1_macvtap left promiscuous mode [ 221.218580][ T5877] device veth0_macvtap left promiscuous mode [ 221.224542][ T5877] device veth1_vlan left promiscuous mode [ 221.230298][ T5877] device veth0_vlan left promiscuous mode [ 221.330652][ T5877] bond0 (unregistering): Released all slaves [ 221.385529][ T7528] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.392582][ T7528] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.400267][ T7528] device bridge_slave_0 entered promiscuous mode [ 221.408982][ T7528] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.416078][ T7528] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.423992][ T7528] device bridge_slave_1 entered promiscuous mode [ 221.441396][ T7528] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.457323][ T7528] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.475744][ T7528] team0: Port device team_slave_0 added [ 221.481863][ T7528] team0: Port device team_slave_1 added [ 221.494656][ T7528] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 221.501630][ T7528] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.527682][ T7528] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 221.539742][ T7528] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 221.546732][ T7528] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.572601][ T7528] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 221.592558][ T7528] device hsr_slave_0 entered promiscuous mode [ 221.599411][ T7528] device hsr_slave_1 entered promiscuous mode [ 221.605715][ T7528] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 221.613298][ T7528] Cannot create hsr debugfs directory [ 221.642421][ T7528] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.649521][ T7528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.656897][ T7528] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.663908][ T7528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.689264][ T7528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.699964][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.708223][ T1918] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.716495][ T1918] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.728984][ T7528] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.739159][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.747659][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.754793][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.773726][ T7528] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 221.784140][ T7528] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 221.798509][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.806910][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.813953][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.822513][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.831151][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.839643][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.847967][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.862555][ T7528] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.870770][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.878485][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.886023][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.893637][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.938676][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.978987][ T7528] device veth0_vlan entered promiscuous mode [ 221.987284][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.995840][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.003434][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.018367][ T7528] device veth1_vlan entered promiscuous mode [ 222.030140][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.039748][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.049900][ T7528] device veth0_macvtap entered promiscuous mode [ 222.058849][ T7528] device veth1_macvtap entered promiscuous mode [ 222.070125][ T7528] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.077712][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.086092][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.093978][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.102529][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.129385][ T7528] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.136781][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.145537][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.191841][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.203273][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.211074][ T7570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 222.221531][ T7570] device bridge_slave_0 left promiscuous mode [ 222.227944][ T7570] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.238560][ T7570] device bridge_slave_1 left promiscuous mode [ 222.244962][ T7570] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.254609][ T7570] bond0: (slave bond_slave_0): Releasing backup interface [ 222.273196][ T7570] bond0: (slave bond_slave_1): Releasing backup interface [ 222.302480][ T7570] team0: Port device team_slave_0 removed [ 222.329446][ T7570] team0: Port device team_slave_1 removed [ 222.339255][ T7570] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:14 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 222.346995][ T7570] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 222.357502][ T7570] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 222.365124][ T7570] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:14 executing program 0: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 222.465267][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.490764][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.500090][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:14 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 222.716536][ T7574] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.762222][ T7574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.772433][ T7574] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:15 executing program 0: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 222.896387][ T7576] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 222.921994][ T7576] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.938157][ T7576] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 223.040863][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 223.091288][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.111629][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 223.295027][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 223.343592][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.385465][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:15 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 223.508900][ T7582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 223.533745][ T7582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.542717][ T7582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.653218][ T7584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 223.700329][ T7584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.710986][ T7584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.857698][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 223.912272][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.924051][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 224.159284][ T7588] chnl_net:caif_netlink_parms(): no params data found [ 224.197456][ T7588] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.204478][ T7588] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.212049][ T7588] device bridge_slave_0 entered promiscuous mode [ 224.219413][ T7588] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.226702][ T7588] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.234382][ T7588] device bridge_slave_1 entered promiscuous mode [ 224.259515][ T7588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.271517][ T7588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.289000][ T7588] team0: Port device team_slave_0 added [ 224.304311][ T7588] team0: Port device team_slave_1 added [ 224.318471][ T7588] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.325520][ T7588] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.351681][ T7588] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.362664][ T7588] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.369784][ T7588] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.395827][ T7588] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.424414][ T7588] device hsr_slave_0 entered promiscuous mode [ 224.431232][ T7588] device hsr_slave_1 entered promiscuous mode [ 224.438898][ T7588] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 224.446661][ T7588] Cannot create hsr debugfs directory [ 224.482624][ T7588] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.489678][ T7588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.496998][ T7588] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.504033][ T7588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.523869][ T1918] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.532018][ T1918] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.547114][ T5877] device hsr_slave_0 left promiscuous mode [ 224.553357][ T5877] device hsr_slave_1 left promiscuous mode [ 224.562757][ T5877] device hsr_slave_0 left promiscuous mode [ 224.570913][ T5877] device hsr_slave_1 left promiscuous mode [ 224.580269][ T5877] device veth1_macvtap left promiscuous mode [ 224.586309][ T5877] device veth0_macvtap left promiscuous mode [ 224.592820][ T5877] device veth1_vlan left promiscuous mode [ 224.598624][ T5877] device veth0_vlan left promiscuous mode [ 224.604578][ T5877] device veth1_macvtap left promiscuous mode [ 224.610701][ T5877] device veth0_macvtap left promiscuous mode [ 224.616703][ T5877] device veth1_vlan left promiscuous mode [ 224.622473][ T5877] device veth0_vlan left promiscuous mode [ 224.762439][ T5877] bond0 (unregistering): Released all slaves [ 224.863015][ T5877] bond0 (unregistering): Released all slaves [ 224.917748][ T7588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.927282][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.935081][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.944224][ T7588] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.961555][ T7588] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 224.971976][ T7588] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.987984][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.997925][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.006266][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.013332][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.022425][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.030887][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.040636][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.047683][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.062411][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.071435][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.081572][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.090095][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.100105][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.108598][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.117392][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.125523][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.133696][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.141860][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.156559][ T7588] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.182103][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.190085][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.199538][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 225.206982][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 225.257460][ T7603] chnl_net:caif_netlink_parms(): no params data found [ 225.266436][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 225.275084][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.333823][ T7603] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.340897][ T7603] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.348616][ T7603] device bridge_slave_0 entered promiscuous mode [ 225.369640][ T7603] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.376712][ T7603] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.385114][ T7603] device bridge_slave_1 entered promiscuous mode [ 225.397956][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 225.406136][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.414981][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.422559][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.435362][ T7613] chnl_net:caif_netlink_parms(): no params data found [ 225.457116][ T7588] device veth0_vlan entered promiscuous mode [ 225.464831][ T7603] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.482533][ T7603] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.500903][ T7603] team0: Port device team_slave_0 added [ 225.511768][ T7603] team0: Port device team_slave_1 added [ 225.528080][ T7588] device veth1_vlan entered promiscuous mode [ 225.538364][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 225.548917][ T7613] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.555972][ T7613] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.563499][ T7613] device bridge_slave_0 entered promiscuous mode [ 225.570897][ T7603] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.577919][ T7603] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.603899][ T7603] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.615180][ T7603] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.622121][ T7603] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.648278][ T7603] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.665177][ T7613] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.672222][ T7613] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.679983][ T7613] device bridge_slave_1 entered promiscuous mode [ 225.701505][ T7588] device veth0_macvtap entered promiscuous mode [ 225.714274][ T7603] device hsr_slave_0 entered promiscuous mode [ 225.721053][ T7603] device hsr_slave_1 entered promiscuous mode [ 225.727500][ T7603] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.735229][ T7603] Cannot create hsr debugfs directory [ 225.740733][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 225.748944][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.760455][ T7613] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.770766][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 225.779348][ T7588] device veth1_macvtap entered promiscuous mode [ 225.787295][ T7613] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.811864][ T7588] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 225.825618][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 225.833621][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.843360][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.852234][ T7613] team0: Port device team_slave_0 added [ 225.858590][ T7613] team0: Port device team_slave_1 added [ 225.865711][ T7588] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 225.881391][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 225.889948][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.912638][ T7613] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.919602][ T7613] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.945536][ T7613] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.956778][ T7613] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.963719][ T7613] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.989694][ T7613] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.036271][ T7645] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 226.060497][ T7613] device hsr_slave_0 entered promiscuous mode [ 226.067045][ T7613] device hsr_slave_1 entered promiscuous mode [ 226.073385][ T7613] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.082834][ T7613] Cannot create hsr debugfs directory [ 226.103842][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 226.122703][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 226.130821][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 226.145967][ T7645] device bridge_slave_0 left promiscuous mode [ 226.152430][ T7645] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.161838][ T7645] device bridge_slave_1 left promiscuous mode [ 226.168111][ T7645] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.178996][ T7645] bond0: (slave bond_slave_0): Releasing backup interface [ 226.201530][ T7645] bond0: (slave bond_slave_1): Releasing backup interface [ 226.239497][ T7645] team0: Port device team_slave_0 removed [ 226.261037][ T7645] team0: Port device team_slave_1 removed [ 226.270325][ T7645] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 226.277994][ T7645] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 226.287000][ T7645] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 226.294476][ T7645] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 226.318310][ T7603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.350343][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 226.361717][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 226.373404][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 226.397398][ T7603] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.409173][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.417014][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.439836][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.448540][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.456983][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.464070][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.472130][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.481630][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.490046][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.497056][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.507434][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.515195][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.537219][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.546945][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.555505][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.563854][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.573313][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.581730][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.590211][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.598488][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.607228][ T7603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.633196][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 226.640745][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 226.650760][ T7603] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.671701][ T7613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.682171][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.690294][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.699444][ T7613] 8021q: adding VLAN 0 to HW filter on device team0 [ 226.720310][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.728676][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.738086][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.745166][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.753385][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.768260][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.778140][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.786507][ T4580] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.793506][ T4580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.801493][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.810223][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.818940][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.838944][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.847822][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.856198][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.864608][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.872955][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.881635][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.889731][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.897969][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.906213][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.914459][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.923649][ T7613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.948042][ T7613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.955865][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 226.963252][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 226.977952][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.986349][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.998704][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.006690][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.014994][ T7603] device veth0_vlan entered promiscuous mode [ 227.023474][ T7603] device veth1_vlan entered promiscuous mode [ 227.034980][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 227.043088][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 227.051118][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.059726][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.073640][ T7603] device veth0_macvtap entered promiscuous mode [ 227.084073][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.092597][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.101585][ T7603] device veth1_macvtap entered promiscuous mode [ 227.108966][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 227.117013][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.135203][ T7603] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 227.142883][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.151468][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.161720][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 227.169772][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.178644][ T7613] device veth0_vlan entered promiscuous mode [ 227.185868][ T7603] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 227.197964][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.205555][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.213068][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.221895][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.233951][ T7613] device veth1_vlan entered promiscuous mode [ 227.258339][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 227.266633][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 227.279016][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 227.287490][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.296868][ T7613] device veth0_macvtap entered promiscuous mode [ 227.314296][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 227.326599][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.334147][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 227.346799][ T7675] device bridge_slave_0 left promiscuous mode [ 227.353149][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.363237][ T7675] device bridge_slave_1 left promiscuous mode [ 227.369536][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.379665][ T7675] bond0: (slave bond_slave_0): Releasing backup interface [ 227.401842][ T7675] bond0: (slave bond_slave_1): Releasing backup interface [ 227.452274][ T7675] team0: Port device team_slave_0 removed [ 227.478013][ T7675] team0: Port device team_slave_1 removed [ 227.487399][ T7675] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 227.494908][ T7675] batman_adv: batadv0: Removing interface: batadv_slave_0 23:18:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:19 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 227.504011][ T7675] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 227.511732][ T7675] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 227.531803][ T7613] device veth1_macvtap entered promiscuous mode [ 227.568129][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 227.577762][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.579965][ T7683] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 23:18:20 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 227.614840][ T7679] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 227.629347][ T7679] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.637503][ T7679] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 227.708762][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 227.723395][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.731706][ T7677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 227.776615][ T7681] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 227.787789][ T7681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.795582][ T7681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 227.865456][ T5877] device hsr_slave_0 left promiscuous mode [ 227.871606][ T5877] device hsr_slave_1 left promiscuous mode [ 227.879623][ T5877] device veth1_macvtap left promiscuous mode [ 227.885663][ T5877] device veth0_macvtap left promiscuous mode [ 227.891643][ T5877] device veth1_vlan left promiscuous mode [ 227.897397][ T5877] device veth0_vlan left promiscuous mode [ 228.011189][ T5877] bond0 (unregistering): Released all slaves [ 228.047676][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.060813][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.068827][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.109295][ T7613] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 228.116772][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.126708][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.155323][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.169247][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.177366][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.243143][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.258744][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.266633][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.306512][ T7689] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.320585][ T7689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.328157][ T7689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.366128][ T7613] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 228.376111][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.389534][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.440955][ T7692] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.453715][ T7692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.462674][ T7692] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.473366][ T7692] device bridge_slave_0 left promiscuous mode [ 228.479899][ T7692] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.490034][ T7692] device bridge_slave_1 left promiscuous mode [ 228.496346][ T7692] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.506793][ T7692] bond0: (slave bond_slave_0): Releasing backup interface [ 228.528068][ T7692] bond0: (slave bond_slave_1): Releasing backup interface [ 228.577323][ T7692] team0: Port device team_slave_0 removed [ 228.609241][ T7692] team0: Port device team_slave_1 removed [ 228.617285][ T7692] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 228.625007][ T7692] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 228.635552][ T7692] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 228.642953][ T7692] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 228.704446][ T7695] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 228.770807][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.811829][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.827873][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 228.954638][ T7697] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.001469][ T7697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.021131][ T7697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.134973][ T7700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.178717][ T7700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.189701][ T7700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.288748][ T7695] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.302891][ T7695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.310818][ T7695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.383405][ T7702] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.389370][ T7708] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 229.406758][ T7702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.414487][ T7702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.460227][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.472555][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.481401][ T7704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.535771][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.549734][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.557780][ T7706] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.668875][ T7708] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.708933][ T7708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.728254][ T7708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 229.892567][ T7710] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.924494][ T7710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.932665][ T7710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 230.046608][ T7712] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.071773][ T7712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.098804][ T7712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.187634][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.273069][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.283893][ T7714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.438996][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.452484][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.460277][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 230.608648][ T7718] chnl_net:caif_netlink_parms(): no params data found [ 230.642813][ T7718] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.649931][ T7718] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.657784][ T7718] device bridge_slave_0 entered promiscuous mode [ 230.665186][ T7718] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.672239][ T7718] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.680068][ T7718] device bridge_slave_1 entered promiscuous mode [ 230.695440][ T7718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.705915][ T7718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.722279][ T7718] team0: Port device team_slave_0 added [ 230.728941][ T7718] team0: Port device team_slave_1 added [ 230.742287][ T7718] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 230.749246][ T7718] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.775143][ T7718] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 230.814149][ T7718] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 230.821138][ T7718] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 230.847021][ T7718] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 230.868310][ T7718] device hsr_slave_0 entered promiscuous mode [ 230.874628][ T7718] device hsr_slave_1 entered promiscuous mode [ 230.882723][ T7718] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 230.890272][ T7718] Cannot create hsr debugfs directory [ 230.929775][ T7718] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.936921][ T7718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.944266][ T7718] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.951311][ T7718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.975670][ T7718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.996764][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.004811][ T1917] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.012427][ T1917] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.025764][ T7718] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.035451][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.043653][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.050743][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.068949][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.077109][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.084175][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.102894][ T7718] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 231.113260][ T7718] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 231.129771][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.138433][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.146824][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.155417][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.171441][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.179033][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.262063][ T7718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.269324][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.276739][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.333961][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.344106][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.399189][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.407214][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.415735][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.423365][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.443344][ T7718] device veth0_vlan entered promiscuous mode [ 231.466517][ T7718] device veth1_vlan entered promiscuous mode [ 231.474111][ T7734] chnl_net:caif_netlink_parms(): no params data found [ 231.511362][ T7718] device veth0_macvtap entered promiscuous mode [ 231.521192][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 231.529476][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 231.537297][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.545620][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.566156][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.578761][ T7718] device veth1_macvtap entered promiscuous mode [ 231.589872][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.596972][ T7734] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.605389][ T7734] device bridge_slave_0 entered promiscuous mode [ 231.616770][ T7718] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.624362][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.632499][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.640870][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.649666][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.656734][ T7734] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.664384][ T7734] device bridge_slave_1 entered promiscuous mode [ 231.681875][ T7734] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.692303][ T5877] device hsr_slave_0 left promiscuous mode [ 231.698373][ T5877] device hsr_slave_1 left promiscuous mode [ 231.706152][ T5877] device hsr_slave_0 left promiscuous mode [ 231.712222][ T5877] device hsr_slave_1 left promiscuous mode [ 231.720596][ T5877] device hsr_slave_0 left promiscuous mode [ 231.726936][ T5877] device hsr_slave_1 left promiscuous mode [ 231.738030][ T5877] device veth1_macvtap left promiscuous mode [ 231.743999][ T5877] device veth0_macvtap left promiscuous mode [ 231.750046][ T5877] device veth1_vlan left promiscuous mode [ 231.755898][ T5877] device veth0_vlan left promiscuous mode [ 231.761823][ T5877] device veth1_macvtap left promiscuous mode [ 231.767808][ T5877] device veth0_macvtap left promiscuous mode [ 231.773779][ T5877] device veth1_vlan left promiscuous mode [ 231.779502][ T5877] device veth0_vlan left promiscuous mode [ 231.785466][ T5877] device veth1_macvtap left promiscuous mode [ 231.791423][ T5877] device veth0_macvtap left promiscuous mode [ 231.797419][ T5877] device veth1_vlan left promiscuous mode [ 231.803202][ T5877] device veth0_vlan left promiscuous mode [ 231.985201][ T5877] bond0 (unregistering): Released all slaves [ 232.081212][ T5877] bond0 (unregistering): Released all slaves [ 232.186433][ T5877] bond0 (unregistering): Released all slaves [ 232.248015][ T7718] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.256441][ T7734] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.267400][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.275968][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.295182][ T7734] team0: Port device team_slave_0 added [ 232.302695][ T7734] team0: Port device team_slave_1 added [ 232.323284][ T7734] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 232.330320][ T7734] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.356202][ T7734] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 232.369948][ T7734] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 232.376905][ T7734] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 232.403105][ T7734] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 232.418406][ T7760] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 232.427791][ T7760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.435159][ T7760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 232.444349][ T7760] device bridge_slave_0 left promiscuous mode [ 232.450471][ T7760] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.459020][ T7760] device bridge_slave_1 left promiscuous mode [ 232.465229][ T7760] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.473473][ T7760] bond0: (slave bond_slave_0): Releasing backup interface [ 232.484851][ T7760] bond0: (slave bond_slave_1): Releasing backup interface [ 232.530125][ T7760] team0: Port device team_slave_0 removed [ 232.558988][ T7760] team0: Port device team_slave_1 removed [ 232.565512][ T7760] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 232.572884][ T7760] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 232.581071][ T7760] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 232.588449][ T7760] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 232.621764][ T7734] device hsr_slave_0 entered promiscuous mode [ 232.648027][ T7734] device hsr_slave_1 entered promiscuous mode [ 232.660639][ T7734] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 232.668292][ T7734] Cannot create hsr debugfs directory [ 232.700785][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 232.727444][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.737020][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 232.870911][ T7766] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 232.921299][ T7766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 232.936512][ T7766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 233.163613][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.181149][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.189972][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 233.261409][ T7768] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.274540][ T7768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.282597][ T7768] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.349414][ T7770] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.362457][ T7770] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.370698][ T7770] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.448703][ T7772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.468870][ T7772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.476412][ T7772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.562017][ T7734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.571473][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.580246][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.589026][ T7734] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.597724][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.606479][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.614880][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.622015][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.638123][ T7734] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 233.648475][ T7734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 233.659901][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.667802][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.676691][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.684841][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.691869][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.699599][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.708156][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.716696][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.725066][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.733582][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.741901][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.750539][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.758730][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.766948][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.775009][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.785659][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.793510][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 233.808107][ T7734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 233.815835][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 233.823217][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 233.863205][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.871708][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.906545][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.915070][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.922580][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.931343][ T7734] device veth0_vlan entered promiscuous mode [ 233.939910][ T7734] device veth1_vlan entered promiscuous mode [ 233.952102][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 233.959971][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 233.968093][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.977294][ T7734] device veth0_macvtap entered promiscuous mode [ 233.984956][ T7734] device veth1_macvtap entered promiscuous mode [ 233.996098][ T7734] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 234.003320][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 234.011448][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.019833][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.029856][ T7734] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 234.037296][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 234.045890][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.107241][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.126156][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.134138][ T7788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.149132][ T7788] device bridge_slave_0 left promiscuous mode [ 234.155743][ T7788] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.168566][ T7788] device bridge_slave_1 left promiscuous mode [ 234.175546][ T7788] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.195822][ T7788] bond0: (slave bond_slave_0): Releasing backup interface [ 234.240624][ T7788] bond0: (slave bond_slave_1): Releasing backup interface [ 234.312276][ T7788] team0: Port device team_slave_0 removed [ 234.339668][ T7788] team0: Port device team_slave_1 removed [ 234.349881][ T7788] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 234.357711][ T7788] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 234.366946][ T7788] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 234.374397][ T7788] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 234.493303][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.531554][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.551353][ T7795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 234.738297][ T7797] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.778710][ T7797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.805051][ T7797] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 234.993706][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 235.009065][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.017205][ T7799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.096492][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 235.110379][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.118376][ T7802] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.180434][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 235.193913][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.201736][ T7804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.304190][ T7790] chnl_net:caif_netlink_parms(): no params data found [ 235.334295][ T7790] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.341499][ T7790] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.349114][ T7790] device bridge_slave_0 entered promiscuous mode [ 235.356539][ T7790] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.363611][ T7790] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.371289][ T7790] device bridge_slave_1 entered promiscuous mode [ 235.401934][ T7790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.412021][ T7790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.433583][ T7790] team0: Port device team_slave_0 added [ 235.441687][ T7790] team0: Port device team_slave_1 added [ 235.460130][ T7790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.467086][ T7790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.492956][ T7790] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.504881][ T7790] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.511810][ T7790] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.537743][ T7790] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.568517][ T7790] device hsr_slave_0 entered promiscuous mode [ 235.575091][ T7790] device hsr_slave_1 entered promiscuous mode [ 235.581381][ T7790] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 235.589105][ T7790] Cannot create hsr debugfs directory [ 235.621587][ T7790] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.628636][ T7790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.636077][ T7790] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.643089][ T7790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.667213][ T7790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.681371][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.691243][ T1919] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.699099][ T1919] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.710821][ T7790] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.737243][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.745582][ T1918] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.752593][ T1918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.760586][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.768875][ T1918] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.775894][ T1918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.784391][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.792827][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.801234][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.809230][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.817581][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.832691][ T7790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.844091][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.852450][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.861833][ T7790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.905990][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.959488][ T7790] device veth0_vlan entered promiscuous mode [ 235.967606][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.976314][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.983817][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.994791][ T7790] device veth1_vlan entered promiscuous mode [ 236.009550][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 236.017999][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 236.039434][ T7790] device veth0_macvtap entered promiscuous mode [ 236.053783][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.062683][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 236.072948][ T7790] device veth1_macvtap entered promiscuous mode [ 236.084210][ T5877] device hsr_slave_0 left promiscuous mode [ 236.090304][ T5877] device hsr_slave_1 left promiscuous mode [ 236.098376][ T5877] device hsr_slave_0 left promiscuous mode [ 236.104602][ T5877] device hsr_slave_1 left promiscuous mode [ 236.113610][ T5877] device veth1_macvtap left promiscuous mode [ 236.119623][ T5877] device veth0_macvtap left promiscuous mode [ 236.125629][ T5877] device veth1_vlan left promiscuous mode [ 236.131384][ T5877] device veth0_vlan left promiscuous mode [ 236.139358][ T5877] device veth1_macvtap left promiscuous mode [ 236.145359][ T5877] device veth0_macvtap left promiscuous mode [ 236.151393][ T5877] device veth1_vlan left promiscuous mode [ 236.157231][ T5877] device veth0_vlan left promiscuous mode [ 236.292074][ T5877] bond0 (unregistering): Released all slaves [ 236.373135][ T5877] bond0 (unregistering): Released all slaves [ 236.410194][ T7790] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 236.417548][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.427112][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.437411][ T7790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.445263][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.453544][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.516374][ T7839] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 236.518675][ T7827] chnl_net:caif_netlink_parms(): no params data found [ 236.540799][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 236.552556][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.560559][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.570561][ T7839] device bridge_slave_0 left promiscuous mode [ 236.577037][ T7839] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.587024][ T7839] device bridge_slave_1 left promiscuous mode [ 236.593451][ T7839] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.606124][ T7839] bond0: (slave bond_slave_0): Releasing backup interface [ 236.622806][ T7839] bond0: (slave bond_slave_1): Releasing backup interface [ 236.658826][ T7839] team0: Port device team_slave_0 removed [ 236.679485][ T7839] team0: Port device team_slave_1 removed [ 236.688728][ T7839] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 236.696445][ T7839] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 236.707638][ T7839] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 236.715227][ T7839] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 236.855127][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 236.900580][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 236.915357][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 237.084531][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.126053][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.142923][ T7846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 237.253642][ T7848] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.278692][ T7848] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.286700][ T7848] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.384035][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.400690][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.409099][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.457350][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 237.480852][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.488612][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.525467][ T7827] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.532495][ T7827] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.541883][ T7827] device bridge_slave_0 entered promiscuous mode [ 237.555033][ T7827] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.562095][ T7827] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.570745][ T7827] device bridge_slave_1 entered promiscuous mode [ 237.590480][ T7827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.602112][ T7827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.619457][ T7827] team0: Port device team_slave_0 added [ 237.627805][ T7827] team0: Port device team_slave_1 added [ 237.643256][ T7827] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.650221][ T7827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.676435][ T7827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.687744][ T7827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.694888][ T7827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.720847][ T7827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.751143][ T7827] device hsr_slave_0 entered promiscuous mode [ 237.757769][ T7827] device hsr_slave_1 entered promiscuous mode [ 237.764081][ T7827] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 237.771976][ T7827] Cannot create hsr debugfs directory [ 237.829190][ T7827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.840976][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 237.853293][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.860906][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.869341][ T7827] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.878877][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.887344][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.895693][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.902712][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.910578][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.919623][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.928133][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.937190][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.944476][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.962719][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.971244][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.985432][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.994117][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.002428][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.010876][ T7827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.023833][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.031545][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.040437][ T7827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.085071][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.122888][ T7827] device veth0_vlan entered promiscuous mode [ 238.129855][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.138197][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.145848][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.155353][ T7827] device veth1_vlan entered promiscuous mode [ 238.175721][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.183613][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 238.192385][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.201897][ T7827] device veth0_macvtap entered promiscuous mode [ 238.213101][ T7827] device veth1_macvtap entered promiscuous mode [ 238.226198][ T7827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 238.236029][ T7827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 238.288258][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 238.297974][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.306651][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.316169][ T7869] device bridge_slave_0 left promiscuous mode [ 238.322377][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.332581][ T7869] device bridge_slave_1 left promiscuous mode [ 238.338807][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.349157][ T7869] bond0: (slave bond_slave_0): Releasing backup interface [ 238.370105][ T7869] bond0: (slave bond_slave_1): Releasing backup interface [ 238.411681][ T7869] team0: Port device team_slave_0 removed [ 238.439272][ T7869] team0: Port device team_slave_1 removed [ 238.445623][ T7869] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 238.453148][ T7869] batman_adv: batadv0: Removing interface: batadv_slave_0 23:18:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 238.461288][ T7869] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 238.468745][ T7869] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 238.484768][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.493573][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.528043][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 238.573830][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 238.605501][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.625974][ T7876] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 238.727771][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 238.797171][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.816080][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 239.009135][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 239.022056][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.030540][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 239.079262][ T7882] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 239.099199][ T7882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.107004][ T7882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.150572][ T7884] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 239.171854][ T7884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.179822][ T7884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.265129][ T7888] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 239.280084][ T7888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.287675][ T7888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.369766][ T7870] chnl_net:caif_netlink_parms(): no params data found [ 239.403709][ T7870] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.410915][ T7870] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.418548][ T7870] device bridge_slave_0 entered promiscuous mode [ 239.425943][ T7870] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.432972][ T7870] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.440898][ T7870] device bridge_slave_1 entered promiscuous mode [ 239.460124][ T7870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.470471][ T7870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.491612][ T7870] team0: Port device team_slave_0 added [ 239.498705][ T7870] team0: Port device team_slave_1 added [ 239.511830][ T7870] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 239.518805][ T7870] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 239.544713][ T7870] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 239.558749][ T7870] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 239.565753][ T7870] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 239.591844][ T7870] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 239.621287][ T7870] device hsr_slave_0 entered promiscuous mode [ 239.627926][ T7870] device hsr_slave_1 entered promiscuous mode [ 239.634423][ T7870] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 239.642073][ T7870] Cannot create hsr debugfs directory [ 239.648953][ T5877] device hsr_slave_0 left promiscuous mode [ 239.655355][ T5877] device hsr_slave_1 left promiscuous mode [ 239.662838][ T5877] device veth1_macvtap left promiscuous mode [ 239.668855][ T5877] device veth0_macvtap left promiscuous mode [ 239.674949][ T5877] device veth1_vlan left promiscuous mode [ 239.680670][ T5877] device veth0_vlan left promiscuous mode [ 239.779964][ T5877] bond0 (unregistering): Released all slaves [ 239.862418][ T7870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.873070][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.881008][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.889716][ T7870] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.898076][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.906587][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.916097][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.923194][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.931266][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.945305][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.953636][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.963186][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.970227][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.979687][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.988467][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.998275][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.006527][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.016361][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.024852][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.033452][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.049545][ T7870] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 240.059922][ T7870] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 240.073812][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.082423][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.094987][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.106690][ T7870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.117395][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.124852][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.170907][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.251908][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.261185][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.269678][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.277915][ T7870] device veth0_vlan entered promiscuous mode [ 240.300211][ T7870] device veth1_vlan entered promiscuous mode [ 240.314898][ T7897] chnl_net:caif_netlink_parms(): no params data found [ 240.342051][ T7870] device veth0_macvtap entered promiscuous mode [ 240.350989][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.359065][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.367453][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.375991][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.390890][ T7870] device veth1_macvtap entered promiscuous mode [ 240.404641][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.411697][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.419400][ T7897] device bridge_slave_0 entered promiscuous mode [ 240.426913][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.433932][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.441638][ T7897] device bridge_slave_1 entered promiscuous mode [ 240.451819][ T7870] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.464223][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.479732][ T7870] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.487253][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.497005][ T7897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.507819][ T7897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.531465][ T7897] team0: Port device team_slave_0 added [ 240.537866][ T7897] team0: Port device team_slave_1 added [ 240.571758][ T7897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 240.578750][ T7897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 240.604734][ T7897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 23:18:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 240.616696][ T7897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 240.623751][ T7897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 240.649832][ T7897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 240.773174][ T7928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 240.800208][ T7928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.816387][ T7928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 240.934867][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 240.959641][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.968210][ T7927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 241.116400][ T7930] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.127745][ T7930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.135860][ T7930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.193036][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.208807][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.216490][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.257495][ T7897] device hsr_slave_0 entered promiscuous mode [ 241.264137][ T7897] device hsr_slave_1 entered promiscuous mode [ 241.271629][ T7897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 241.280524][ T7897] Cannot create hsr debugfs directory [ 241.297074][ T7932] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.308316][ T7932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.315920][ T7932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.344735][ T7936] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 241.357680][ T7936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.366011][ T7936] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.445776][ T7897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.457184][ T7897] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.468081][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.475682][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.483115][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.491549][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.499774][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.506812][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.516849][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.535397][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.543742][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.552103][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.559120][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.566854][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.575622][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.584404][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.592720][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.601482][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.609822][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.618498][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.631678][ T7897] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 241.642291][ T7897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 241.653637][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.661930][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.670414][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.678665][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.691183][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.703673][ T7897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.711304][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.718784][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.754006][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.762708][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.799285][ T7897] device veth0_vlan entered promiscuous mode [ 241.807892][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.816096][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.824848][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.832503][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.851069][ T7897] device veth1_vlan entered promiscuous mode [ 241.861692][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 241.870699][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 241.878567][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.887764][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.900021][ T7897] device veth0_macvtap entered promiscuous mode [ 241.908011][ T7897] device veth1_macvtap entered promiscuous mode [ 241.919980][ T7897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.930470][ T7897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.941136][ T7897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 241.948416][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 241.956485][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.964212][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.972560][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.981982][ T7897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 241.992550][ T7897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.003181][ T7897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.012217][ T5877] device hsr_slave_0 left promiscuous mode [ 242.018559][ T5877] device hsr_slave_1 left promiscuous mode [ 242.026494][ T5877] device veth1_macvtap left promiscuous mode [ 242.032463][ T5877] device veth0_macvtap left promiscuous mode [ 242.038510][ T5877] device veth1_vlan left promiscuous mode [ 242.044277][ T5877] device veth0_vlan left promiscuous mode [ 242.150060][ T5877] bond0 (unregistering): Released all slaves [ 242.237219][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.246763][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.287391][ T7959] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 242.300648][ T7959] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 242.310927][ T7959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.318978][ T7959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.328037][ T7959] device bridge_slave_0 left promiscuous mode [ 242.334134][ T7959] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.342758][ T7959] device bridge_slave_1 left promiscuous mode [ 242.348969][ T7959] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.357376][ T7959] bond0: (slave bond_slave_0): Releasing backup interface [ 242.368093][ T7959] bond0: (slave bond_slave_1): Releasing backup interface [ 242.389097][ T7959] team0: Port device team_slave_0 removed [ 242.402889][ T7959] team0: Port device team_slave_1 removed [ 242.409490][ T7959] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 242.416992][ T7959] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 242.425313][ T7959] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 242.432729][ T7959] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 242.512916][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 242.528997][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.538257][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 242.569421][ T7967] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 242.593837][ T7967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.608071][ T7967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.789638][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 242.835313][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.843681][ T7968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.931253][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 242.962403][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.971023][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.017746][ T7951] chnl_net:caif_netlink_parms(): no params data found [ 243.088315][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.095487][ T7951] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.103715][ T7951] device bridge_slave_0 entered promiscuous mode [ 243.111272][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.118372][ T7951] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.126071][ T7951] device bridge_slave_1 entered promiscuous mode [ 243.144778][ T7951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.155427][ T7951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.173861][ T7951] team0: Port device team_slave_0 added [ 243.180429][ T7951] team0: Port device team_slave_1 added [ 243.199515][ T7951] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 243.206495][ T7951] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.232468][ T7951] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 243.243956][ T7951] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 243.250932][ T7951] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.277082][ T7951] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 243.305823][ T7951] device hsr_slave_0 entered promiscuous mode [ 243.312275][ T7951] device hsr_slave_1 entered promiscuous mode [ 243.318849][ T7951] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 243.326551][ T7951] Cannot create hsr debugfs directory [ 243.356926][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.364019][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.371355][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.378369][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.403875][ T7951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.413355][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.421468][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.429490][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.438875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 243.450142][ T7951] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.459675][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.468037][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.475069][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.484449][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.493488][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.500563][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.517254][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.525777][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.534385][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.567107][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.575311][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.584079][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.603213][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.611415][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.619994][ T7951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.672975][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.681843][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.724529][ T7951] device veth0_vlan entered promiscuous mode [ 243.731089][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.739277][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.748224][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.756177][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.769660][ T7951] device veth1_vlan entered promiscuous mode [ 243.781764][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.789861][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.797570][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.805903][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.815422][ T7951] device veth0_macvtap entered promiscuous mode [ 243.823203][ T7951] device veth1_macvtap entered promiscuous mode [ 243.840022][ T7951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.850488][ T7951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.861422][ T7951] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 243.869396][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 243.877440][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 243.885766][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.894248][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.903458][ T7951] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.914017][ T7951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.925272][ T7951] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 243.933541][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.942112][ T1918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.988692][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 243.998594][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.005988][ T7990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.014539][ T7990] device bridge_slave_0 left promiscuous mode [ 244.020732][ T7990] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.029173][ T7990] device bridge_slave_1 left promiscuous mode [ 244.035533][ T7990] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.043970][ T7990] bond0: (slave bond_slave_0): Releasing backup interface [ 244.066793][ T7990] bond0: (slave bond_slave_1): Releasing backup interface [ 244.119809][ T7990] team0: Port device team_slave_0 removed [ 244.155848][ T7990] team0: Port device team_slave_1 removed [ 244.162446][ T7990] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 244.169982][ T7990] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 244.179561][ T7990] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 244.187086][ T7990] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 244.371692][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.421097][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.429474][ T8000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 244.529955][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.555576][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.563527][ T8001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 244.610422][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.642696][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.672445][ T8002] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 244.743349][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.772798][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.782348][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.821198][ T8006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.834483][ T8006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.842088][ T8006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.866008][ T5877] device hsr_slave_0 left promiscuous mode [ 244.874814][ T5877] device hsr_slave_1 left promiscuous mode [ 244.885853][ T5877] device hsr_slave_0 left promiscuous mode [ 244.891986][ T5877] device hsr_slave_1 left promiscuous mode [ 244.898535][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 244.905944][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 244.913470][ T5877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 244.920860][ T5877] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 244.929022][ T5877] device bridge_slave_1 left promiscuous mode [ 244.935162][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.943511][ T5877] device bridge_slave_0 left promiscuous mode [ 244.949676][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.960578][ T5877] device veth1_macvtap left promiscuous mode [ 244.966596][ T5877] device veth0_macvtap left promiscuous mode [ 244.972566][ T5877] device veth1_vlan left promiscuous mode [ 244.978347][ T5877] device veth0_vlan left promiscuous mode [ 244.984370][ T5877] device veth1_macvtap left promiscuous mode [ 244.990743][ T5877] device veth0_macvtap left promiscuous mode [ 244.996746][ T5877] device veth1_vlan left promiscuous mode [ 245.002551][ T5877] device veth0_vlan left promiscuous mode [ 245.147561][ T5877] bond0 (unregistering): Released all slaves [ 245.241416][ T5877] team0 (unregistering): Port device team_slave_1 removed [ 245.251517][ T5877] team0 (unregistering): Port device team_slave_0 removed [ 245.260902][ T5877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 245.271692][ T5877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 245.301578][ T5877] bond0 (unregistering): Released all slaves [ 245.414622][ T7992] chnl_net:caif_netlink_parms(): no params data found [ 245.445919][ T7992] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.453170][ T7992] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.461004][ T7992] device bridge_slave_0 entered promiscuous mode [ 245.468262][ T7992] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.475374][ T7992] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.483007][ T7992] device bridge_slave_1 entered promiscuous mode [ 245.499021][ T7992] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.509130][ T7992] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.527225][ T7992] team0: Port device team_slave_0 added [ 245.533512][ T7992] team0: Port device team_slave_1 added [ 245.546269][ T7992] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.553188][ T7992] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.579115][ T7992] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.590584][ T7992] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 245.597592][ T7992] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.623491][ T7992] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.645735][ T7992] device hsr_slave_0 entered promiscuous mode [ 245.652161][ T7992] device hsr_slave_1 entered promiscuous mode [ 245.659359][ T7992] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 245.666951][ T7992] Cannot create hsr debugfs directory [ 245.693336][ T7992] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.700371][ T7992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.707762][ T7992] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.714786][ T7992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.739800][ T7992] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.753613][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.761886][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.769894][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.782867][ T7992] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.798069][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.807105][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.814119][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.833358][ T7992] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 245.844029][ T7992] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 245.860725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.869376][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.876419][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.886744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 245.895926][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.904445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.912954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.930786][ T7992] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.940148][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.948571][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.956251][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 245.963586][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.020714][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.035338][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.113805][ T8017] chnl_net:caif_netlink_parms(): no params data found [ 246.140249][ T7992] device veth0_vlan entered promiscuous mode [ 246.149406][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.158141][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.169347][ T7992] device veth1_vlan entered promiscuous mode [ 246.181637][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.189537][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.197401][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 246.220631][ T7992] device veth0_macvtap entered promiscuous mode [ 246.231757][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 246.239833][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.248074][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.257552][ T7992] device veth1_macvtap entered promiscuous mode [ 246.264131][ T8017] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.271251][ T8017] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.280630][ T8017] device bridge_slave_0 entered promiscuous mode [ 246.287924][ T8017] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.294974][ T8017] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.302452][ T8017] device bridge_slave_1 entered promiscuous mode [ 246.309534][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 246.318656][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.338538][ T8017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.348856][ T8017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.365862][ T7992] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 246.373827][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.382538][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.407718][ T8017] team0: Port device team_slave_0 added [ 246.415001][ T7992] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 246.422794][ T8017] team0: Port device team_slave_1 added [ 246.429472][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.437944][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.461665][ T8017] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.468643][ T8017] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.495191][ T8017] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.510418][ T8017] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.517611][ T8017] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.543540][ T8017] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.568854][ T8017] device hsr_slave_0 entered promiscuous mode [ 246.575592][ T8017] device hsr_slave_1 entered promiscuous mode [ 246.582005][ T8017] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.590828][ T8017] Cannot create hsr debugfs directory [ 246.608693][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 246.621747][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.629631][ T8044] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.640000][ T8044] device bridge_slave_0 left promiscuous mode [ 246.646430][ T8044] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.656993][ T8044] device bridge_slave_1 left promiscuous mode [ 246.663292][ T8044] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.674011][ T8044] bond0: (slave bond_slave_0): Releasing backup interface [ 246.693903][ T8044] bond0: (slave bond_slave_1): Releasing backup interface [ 246.729671][ T8044] team0: Port device team_slave_0 removed [ 246.759891][ T8044] team0: Port device team_slave_1 removed [ 246.770218][ T8044] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 246.778927][ T8044] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 246.788142][ T8044] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 246.795683][ T8044] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 246.882309][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 246.906111][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.921161][ T8047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 246.980718][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.013173][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.034453][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 247.177262][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.206537][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.223677][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.294043][ T8053] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.310065][ T8053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.320712][ T8053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.347631][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.359446][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.371082][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.452377][ T8017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.465714][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.473254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.482879][ T8017] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.491169][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.499814][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.508241][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.515316][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.530039][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.545124][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.553518][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.561851][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.568870][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.577143][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 247.585771][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 247.594218][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 247.602747][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 247.611389][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 247.619894][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 247.634395][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 247.643333][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.652356][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.663503][ T8017] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 247.674307][ T8017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 247.683049][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.691386][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.707568][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.714957][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.723413][ T8017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.735928][ T5877] device hsr_slave_0 left promiscuous mode [ 247.741998][ T5877] device hsr_slave_1 left promiscuous mode [ 247.749848][ T5877] device veth1_macvtap left promiscuous mode [ 247.755920][ T5877] device veth0_macvtap left promiscuous mode [ 247.761937][ T5877] device veth1_vlan left promiscuous mode [ 247.767654][ T5877] device veth0_vlan left promiscuous mode [ 247.866211][ T5877] bond0 (unregistering): Released all slaves [ 247.934616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.943190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.978786][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.986929][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.995505][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.003058][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.012226][ T8017] device veth0_vlan entered promiscuous mode [ 248.020962][ T8017] device veth1_vlan entered promiscuous mode [ 248.032544][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 248.041359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 248.049256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.058271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.068152][ T8017] device veth0_macvtap entered promiscuous mode [ 248.076141][ T8017] device veth1_macvtap entered promiscuous mode [ 248.086715][ T8017] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 248.094103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 248.102005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.109956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.118380][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.128502][ T8017] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 248.136051][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.144489][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.182590][ T8070] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 248.199195][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.210659][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.218585][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 248.229091][ T8070] device bridge_slave_0 left promiscuous mode [ 248.235720][ T8070] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.248099][ T8070] device bridge_slave_1 left promiscuous mode [ 248.254314][ T8070] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.265388][ T8070] bond0: (slave bond_slave_0): Releasing backup interface [ 248.283593][ T8070] bond0: (slave bond_slave_1): Releasing backup interface [ 248.318561][ T8070] team0: Port device team_slave_0 removed [ 248.340704][ T8070] team0: Port device team_slave_1 removed [ 248.350245][ T8070] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 248.357845][ T8070] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 248.373383][ T8070] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 248.381245][ T8070] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 248.534950][ T8077] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.558020][ T8077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.578997][ T8077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 248.701687][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.755231][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.772212][ T8078] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 248.923748][ T8079] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.959626][ T8079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.980504][ T8079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.108580][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 249.121813][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.130674][ T8082] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.191040][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 249.211887][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.219663][ T8084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.343293][ T8072] chnl_net:caif_netlink_parms(): no params data found [ 249.376259][ T8072] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.383283][ T8072] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.391142][ T8072] device bridge_slave_0 entered promiscuous mode [ 249.398481][ T8072] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.405724][ T8072] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.413466][ T8072] device bridge_slave_1 entered promiscuous mode [ 249.428897][ T8072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.439530][ T8072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.474585][ T8072] team0: Port device team_slave_0 added [ 249.480886][ T8072] team0: Port device team_slave_1 added [ 249.500950][ T8072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.508080][ T8072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.534373][ T8072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.554000][ T8072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.560997][ T8072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.586968][ T8072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.615054][ T8072] device hsr_slave_0 entered promiscuous mode [ 249.621421][ T8072] device hsr_slave_1 entered promiscuous mode [ 249.627995][ T8072] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 249.635929][ T8072] Cannot create hsr debugfs directory [ 249.669590][ T8072] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.676663][ T8072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.683908][ T8072] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.690958][ T8072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.715596][ T8072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.729074][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.737030][ T1919] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.745120][ T1919] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.756748][ T8072] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.766291][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.774460][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.781617][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.804232][ T8072] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 249.814894][ T8072] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.828078][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.836360][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.843363][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.851866][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.860542][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.869185][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.877469][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.891477][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.899043][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.912649][ T8072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.920118][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.927941][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.967422][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.011708][ T8072] device veth0_vlan entered promiscuous mode [ 250.018710][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.028697][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.036385][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.048086][ T8072] device veth1_vlan entered promiscuous mode [ 250.061681][ T8072] device veth0_macvtap entered promiscuous mode [ 250.070642][ T8072] device veth1_macvtap entered promiscuous mode [ 250.078507][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 250.087489][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 250.096364][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.105831][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.127646][ T8072] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 250.135207][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.148013][ T8072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 250.156231][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.181008][ T5877] device hsr_slave_0 left promiscuous mode [ 250.187376][ T5877] device hsr_slave_1 left promiscuous mode [ 250.195085][ T5877] device hsr_slave_0 left promiscuous mode [ 250.201162][ T5877] device hsr_slave_1 left promiscuous mode [ 250.209895][ T5877] device veth1_macvtap left promiscuous mode [ 250.215910][ T5877] device veth0_macvtap left promiscuous mode [ 250.221873][ T5877] device veth1_vlan left promiscuous mode [ 250.227719][ T5877] device veth0_vlan left promiscuous mode [ 250.234181][ T5877] device veth1_macvtap left promiscuous mode [ 250.240216][ T5877] device veth0_macvtap left promiscuous mode [ 250.246242][ T5877] device veth1_vlan left promiscuous mode [ 250.251972][ T5877] device veth0_vlan left promiscuous mode [ 250.390524][ T5877] bond0 (unregistering): Released all slaves [ 250.493058][ T5877] bond0 (unregistering): Released all slaves [ 250.557419][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.572085][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.579673][ T8120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.588964][ T8120] device bridge_slave_0 left promiscuous mode [ 250.595119][ T8120] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.603931][ T8120] device bridge_slave_1 left promiscuous mode [ 250.610127][ T8120] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.618716][ T8120] bond0: (slave bond_slave_0): Releasing backup interface [ 250.637056][ T8120] bond0: (slave bond_slave_1): Releasing backup interface [ 250.679594][ T8120] team0: Port device team_slave_0 removed [ 250.708967][ T8120] team0: Port device team_slave_1 removed [ 250.716019][ T8120] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:18:43 executing program 3: chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 250.723402][ T8120] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 250.731619][ T8120] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 250.739101][ T8120] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 250.838708][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.883901][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.901988][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 251.085504][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.117350][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.126680][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 251.274454][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.303262][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.311719][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 251.374366][ T8132] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.386400][ T8132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.394046][ T8132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.442250][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.456785][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.464415][ T8134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.530692][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.543765][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.551936][ T8136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.612982][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.632376][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.640345][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.708813][ T8112] chnl_net:caif_netlink_parms(): no params data found [ 251.738938][ T8112] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.745989][ T8112] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.753673][ T8112] device bridge_slave_0 entered promiscuous mode [ 251.762839][ T8112] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.769877][ T8112] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.777579][ T8112] device bridge_slave_1 entered promiscuous mode [ 251.794116][ T8112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.804345][ T8112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.822496][ T8112] team0: Port device team_slave_0 added [ 251.828933][ T8112] team0: Port device team_slave_1 added [ 251.843169][ T8112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.850230][ T8112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.876144][ T8112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.887557][ T8112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.894478][ T8112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.920558][ T8112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 251.941646][ T8112] device hsr_slave_0 entered promiscuous mode [ 251.948386][ T8112] device hsr_slave_1 entered promiscuous mode [ 251.955806][ T8112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 251.963374][ T8112] Cannot create hsr debugfs directory [ 252.001291][ T8112] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.008355][ T8112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.015664][ T8112] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.022878][ T8112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.052447][ T8112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.063568][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.072868][ T1917] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.080804][ T1917] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.092645][ T8112] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.102626][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.110897][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.117993][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.135623][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.144166][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.151221][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.159979][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.168885][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.179590][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.187568][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.198367][ T8112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.209574][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.224253][ T8112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.232655][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.240537][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.248337][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.285706][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.325812][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.334171][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.342453][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.351057][ T8112] device veth0_vlan entered promiscuous mode [ 252.360237][ T8112] device veth1_vlan entered promiscuous mode [ 252.373165][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 252.381287][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 252.389386][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.399091][ T8112] device veth0_macvtap entered promiscuous mode [ 252.409573][ T8112] device veth1_macvtap entered promiscuous mode [ 252.421806][ T8112] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.429193][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.439073][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 252.449020][ T8112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.457842][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.517473][ T8161] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 252.534054][ T8161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.542166][ T8161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.553214][ T8161] device bridge_slave_0 left promiscuous mode [ 252.560082][ T8161] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.570856][ T8161] device bridge_slave_1 left promiscuous mode [ 252.577275][ T8161] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.589093][ T8161] bond0: (slave bond_slave_0): Releasing backup interface [ 252.609222][ T8161] bond0: (slave bond_slave_1): Releasing backup interface [ 252.657640][ T8161] team0: Port device team_slave_0 removed [ 252.682427][ T8161] team0: Port device team_slave_1 removed [ 252.692146][ T8161] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 252.699735][ T8161] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 252.709195][ T8161] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 252.716817][ T8161] batman_adv: batadv0: Removing interface: batadv_slave_1 23:18:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:45 executing program 3: chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 252.756544][ T8161] syz-executor.1 (8161) used greatest stack depth: 9872 bytes left [ 252.809175][ T8172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 252.822063][ T8172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.831981][ T8172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 252.902171][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 252.919922][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.927938][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 252.996047][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.010641][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.018429][ T8168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.065383][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.077446][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.085348][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.136911][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.157608][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.165610][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.213746][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.228524][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.236338][ T8178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.293794][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 253.308405][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.316195][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.399848][ T8158] chnl_net:caif_netlink_parms(): no params data found [ 253.429543][ T8158] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.436815][ T8158] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.444441][ T8158] device bridge_slave_0 entered promiscuous mode [ 253.451917][ T8158] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.458974][ T8158] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.466694][ T8158] device bridge_slave_1 entered promiscuous mode [ 253.481613][ T8158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.491647][ T8158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.509574][ T8158] team0: Port device team_slave_0 added [ 253.516489][ T8158] team0: Port device team_slave_1 added [ 253.531754][ T8158] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.538717][ T8158] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.565033][ T8158] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.576699][ T8158] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.583724][ T8158] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.609728][ T8158] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.631199][ T8158] device hsr_slave_0 entered promiscuous mode [ 253.637843][ T8158] device hsr_slave_1 entered promiscuous mode [ 253.644104][ T8158] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.651696][ T8158] Cannot create hsr debugfs directory [ 253.680081][ T8158] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.687130][ T8158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.694394][ T8158] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.701488][ T8158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.726498][ T8158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.736827][ T8158] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.746146][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.754032][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.763138][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.785337][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.793716][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.802055][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.809070][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.816811][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.825593][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.834213][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.842766][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.851137][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.859684][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.868238][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.876399][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.884952][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.894974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.903010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.912271][ T8158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.924509][ T8158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.932100][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.939513][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.972588][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.981323][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.018008][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.026240][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.035381][ T8158] device veth0_vlan entered promiscuous mode [ 254.043550][ T8158] device veth1_vlan entered promiscuous mode [ 254.050278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.057807][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.065429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.079508][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.088783][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.097179][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.106512][ T8158] device veth0_macvtap entered promiscuous mode [ 254.113973][ T8158] device veth1_macvtap entered promiscuous mode [ 254.124455][ T8158] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.131855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.139906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.147739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.156468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.167443][ T8158] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.180985][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.189594][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.228048][ T8202] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 254.244261][ T8202] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.257663][ T8202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.265607][ T8202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.275907][ T8202] device bridge_slave_0 left promiscuous mode [ 254.282094][ T8202] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.292569][ T8202] device bridge_slave_1 left promiscuous mode [ 254.298845][ T8202] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.308758][ T8202] bond0: (slave bond_slave_0): Releasing backup interface [ 254.329776][ T8202] bond0: (slave bond_slave_1): Releasing backup interface [ 254.377083][ T8202] team0: Port device team_slave_0 removed [ 254.402657][ T8202] team0: Port device team_slave_1 removed [ 254.412199][ T8202] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 254.419988][ T8202] batman_adv: batadv0: Removing interface: batadv_slave_0 23:18:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:46 executing program 3: chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.428941][ T8202] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 254.436564][ T8202] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 254.514195][ T8206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.529038][ T8206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.537455][ T8206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.607274][ T8211] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.625918][ T8211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.633650][ T8211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.702293][ T8210] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.721193][ T8210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.729131][ T8210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.799017][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.817930][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.825801][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:47 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.871966][ T8204] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.886934][ T8204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.895930][ T8204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 254.973759][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.988253][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.996505][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.068419][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.083014][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.091258][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.155564][ T8218] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.170490][ T8218] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.178653][ T8218] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.242724][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.258226][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.266761][ T8220] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 255.310271][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.321844][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.329354][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 255.384122][ T8224] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.399770][ T8224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.407563][ T8224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 255.447613][ T8232] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.474719][ T8232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.487890][ T8232] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:47 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 255.580978][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.633612][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.642987][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 255.850181][ T8230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.901162][ T8230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.925934][ T8230] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.005254][ T8229] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.033473][ T8229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.041429][ T8229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.091735][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.106335][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.113861][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.142679][ T8236] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.153830][ T8236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.162217][ T8236] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(0x0, 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.197504][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.210467][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.219729][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.270310][ T8238] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.288733][ T8238] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.296643][ T8238] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.364394][ T8240] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.389133][ T8240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.397980][ T8240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.468456][ T8242] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.490988][ T8242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.499133][ T8242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 256.549669][ T8246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.562760][ T8246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.571206][ T8246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.628004][ T8248] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.642573][ T8248] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.650590][ T8248] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.719373][ T8250] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.733784][ T8250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.742161][ T8250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.813432][ T8252] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.829225][ T8252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.837265][ T8252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.906975][ T8254] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 256.920295][ T8254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.928572][ T8254] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.163440][ T8256] chnl_net:caif_netlink_parms(): no params data found [ 257.198181][ T8256] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.205243][ T8256] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.213164][ T8256] device bridge_slave_0 entered promiscuous mode [ 257.221703][ T1850] device hsr_slave_0 left promiscuous mode [ 257.227866][ T1850] device hsr_slave_1 left promiscuous mode [ 257.236024][ T1850] device veth1_macvtap left promiscuous mode [ 257.242027][ T1850] device veth0_macvtap left promiscuous mode [ 257.248103][ T1850] device veth1_vlan left promiscuous mode [ 257.253839][ T1850] device veth0_vlan left promiscuous mode [ 257.356598][ T1850] bond0 (unregistering): Released all slaves [ 257.398716][ T8256] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.405782][ T8256] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.413622][ T8256] device bridge_slave_1 entered promiscuous mode [ 257.428894][ T8256] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.440989][ T8256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.459286][ T8256] team0: Port device team_slave_0 added [ 257.465943][ T8256] team0: Port device team_slave_1 added [ 257.479721][ T8256] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.486692][ T8256] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.512862][ T8256] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.524456][ T8256] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.531597][ T8256] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.557755][ T8256] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.578438][ T8256] device hsr_slave_0 entered promiscuous mode [ 257.585037][ T8256] device hsr_slave_1 entered promiscuous mode [ 257.591366][ T8256] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 257.599171][ T8256] Cannot create hsr debugfs directory [ 257.627025][ T8256] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.634048][ T8256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.641416][ T8256] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.648578][ T8256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.674109][ T8256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.684329][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.693787][ T4580] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.701801][ T4580] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.711300][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 257.722192][ T8256] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.731906][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.740578][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.747615][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.766116][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.774318][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.781360][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.790614][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.799502][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.808366][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.818697][ T8256] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.830821][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.839946][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.848279][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.862576][ T8256] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.870148][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.877583][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.918554][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.962516][ T8256] device veth0_vlan entered promiscuous mode [ 257.969571][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.978408][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.985875][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.996698][ T8256] device veth1_vlan entered promiscuous mode [ 258.009087][ T8256] device veth0_macvtap entered promiscuous mode [ 258.016038][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 258.024064][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 258.032216][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.040484][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 258.049995][ T8256] device veth1_macvtap entered promiscuous mode [ 258.061167][ T8256] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 258.071150][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.082452][ T8256] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 258.090155][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.124210][ T8285] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 258.140808][ T8285] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.152529][ T8285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.161136][ T8285] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.171864][ T8285] device bridge_slave_0 left promiscuous mode [ 258.178616][ T8285] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.188682][ T8285] device bridge_slave_1 left promiscuous mode [ 258.195313][ T8285] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.205175][ T8285] bond0: (slave bond_slave_0): Releasing backup interface [ 258.225348][ T8285] bond0: (slave bond_slave_1): Releasing backup interface [ 258.259291][ T8285] team0: Port device team_slave_0 removed 23:18:50 executing program 2: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(0x0, 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.282062][ T8285] team0: Port device team_slave_1 removed [ 258.291733][ T8285] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 258.299754][ T8285] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 258.308998][ T8285] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 258.316910][ T8285] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 258.386858][ T8297] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 258.401482][ T8292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.417579][ T8292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.425491][ T8292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.492567][ T8294] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.511273][ T8294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.519213][ T8294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(0x0, 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.550393][ T8287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.567995][ T8287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.575439][ T8287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.632485][ T8295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.648858][ T8295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.657632][ T8295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.702060][ T8291] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.712853][ T8291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.720777][ T8291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.767451][ T8297] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.793462][ T8297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.801437][ T8297] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 2: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.863175][ T8299] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.869583][ T8310] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 258.887703][ T8299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.895958][ T8299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.938909][ T8301] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 258.951032][ T8301] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.960093][ T8301] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 258.996572][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.010469][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.018326][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.069375][ T8306] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.087819][ T8306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.095726][ T8306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.139142][ T8308] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.158019][ T8308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.166321][ T8308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.205754][ T8310] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.233822][ T8310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.241863][ T8310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 2: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.297886][ T8312] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.312470][ T8323] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 259.325010][ T8312] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.332752][ T8312] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.374637][ T8314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.388301][ T8314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.396223][ T8314] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.430180][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.446440][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.455221][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.509277][ T8318] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.526503][ T8318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.534114][ T8318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.603277][ T8320] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.628314][ T8320] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.636444][ T8320] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.690109][ T8323] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.708933][ T8323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.717582][ T8323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.781723][ T8326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.781924][ T8336] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 259.806318][ T8326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.814037][ T8326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.883105][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.908598][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.918016][ T8328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.963007][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.976036][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.985881][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.040124][ T8332] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.056617][ T8332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.064387][ T8332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.137215][ T8334] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.151907][ T8334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.160370][ T8334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.216909][ T8336] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.243073][ T8336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.250861][ T8336] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.312176][ T8338] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.322795][ T8348] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 260.339057][ T8338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.347208][ T8338] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.415268][ T8340] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.433342][ T8340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.441403][ T8340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.488277][ T8342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.499985][ T8342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.515709][ T8342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.567007][ T8344] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.583781][ T8344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.591853][ T8344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.667372][ T8346] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.682660][ T8346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.691334][ T8346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.758882][ T8348] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.781975][ T8348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.790647][ T8348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 2: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.857618][ T8360] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 260.860186][ T8350] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.881972][ T8350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.889839][ T8350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 260.941654][ T8352] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 260.971363][ T8352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.978991][ T8352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.022325][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.033495][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.041173][ T8354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.103170][ T8356] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.118600][ T8356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.126644][ T8356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.205889][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.222513][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.230802][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.291932][ T8360] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.317952][ T8360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.326040][ T8360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.382710][ T8362] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.404469][ T8372] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 261.410534][ T8362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.422266][ T8362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 261.490673][ T8364] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.524194][ T8364] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.532404][ T8364] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 23:18:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:18:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.640987][ T8366] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.652549][ T8366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.663082][ T8366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.738552][ T8368] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.762742][ T8368] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.770554][ T8368] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 1: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.841649][ T8370] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.858455][ T8370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.866938][ T8370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 261.939725][ T8372] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 261.954233][ T8372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.962239][ T8372] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 262.029864][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.049619][ T8398] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 262.077222][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.086712][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.191612][ T8390] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.206912][ T8390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.221439][ T8390] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.298548][ T8392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.313011][ T8392] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.322049][ T8392] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.392159][ T8394] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.407499][ T8394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.415842][ T8394] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.489863][ T8398] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.504175][ T8398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.512153][ T8398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) [ 262.570936][ T8410] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.604693][ T8422] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 262.616988][ T8410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.625955][ T8410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.678831][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.692462][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.702329][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.755450][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.774119][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.781975][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.849780][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.869895][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.878099][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 262.951971][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 262.968128][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.975872][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:18:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.027908][ T8426] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.073011][ T8426] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.079121][ T8436] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.083013][ T8426] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.140544][ T8428] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.153095][ T8428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.163408][ T8428] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.219541][ T8430] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.234426][ T8430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.243140][ T8430] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.298272][ T8432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.323948][ T8432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.332762][ T8432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:18:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.410313][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.437006][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.444880][ T8436] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.521848][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.522094][ T8448] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.545687][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.553347][ T8438] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.599322][ T8440] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.613238][ T8440] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.621047][ T8440] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.676835][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.692383][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.700321][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 263.771397][ T8446] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.799904][ T8446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.809720][ T8446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.879910][ T8448] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.895208][ T8448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.902927][ T8448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 263.964161][ T8450] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 263.985206][ T8460] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 263.992359][ T8450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.002709][ T8450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.044497][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.058343][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.065908][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 264.127087][ T8456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.141395][ T8456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.149517][ T8456] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.216455][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.242657][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.250561][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 264.321251][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.337235][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.345215][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.424573][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.441358][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.449274][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.521250][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.530476][ T8472] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 264.544592][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.553204][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.599456][ T8464] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.611915][ T8464] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.620859][ T8464] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 264.676151][ T8466] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.692446][ T8466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.700338][ T8466] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.763785][ T8468] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.789448][ T8468] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.797578][ T8468] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 264.867887][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.883222][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.891514][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 264.968709][ T8472] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 264.983140][ T8472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.991037][ T8472] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.062437][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.077582][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.085505][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.134072][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.147345][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.155101][ T8476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 265.207858][ T8478] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.228343][ T8478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.236083][ T8478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.307661][ T8480] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.322451][ T8480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.330300][ T8480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.389634][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.414626][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.423015][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.531556][ T8484] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.548794][ T8484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.556740][ T8484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(0x0, &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.602194][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.617719][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.625641][ T8486] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 265.683002][ T8488] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.700070][ T8488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.708038][ T8488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.777723][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.794632][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.802887][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.870795][ T8492] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 265.898455][ T8492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 265.906579][ T8492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 265.988747][ T8494] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 266.031115][ T8494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.041042][ T8494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 266.148760][ T8496] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.179476][ T8496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:18:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(0x0, &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 266.199250][ T8496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 23:18:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 266.347289][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.416551][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.434501][ T8498] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 266.622284][ T8500] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.638522][ T8500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.647470][ T8500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:18:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:18:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 266.743293][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.770060][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.777901][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.820850][ T8516] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.832232][ T8516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.840993][ T8516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.894533][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.909343][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.917156][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.984894][ T8522] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.998531][ T8522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.006726][ T8522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.528749][ T5877] device hsr_slave_0 left promiscuous mode [ 267.535076][ T5877] device hsr_slave_1 left promiscuous mode [ 267.542959][ T5877] device veth1_macvtap left promiscuous mode [ 267.548962][ T5877] device veth0_macvtap left promiscuous mode [ 267.555025][ T5877] device veth1_vlan left promiscuous mode [ 267.560925][ T5877] device veth0_vlan left promiscuous mode [ 267.685188][ T5877] bond0 (unregistering): Released all slaves [ 267.811231][ T8524] chnl_net:caif_netlink_parms(): no params data found [ 267.841135][ T8524] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.848246][ T8524] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.855910][ T8524] device bridge_slave_0 entered promiscuous mode [ 267.862989][ T8524] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.870208][ T8524] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.877942][ T8524] device bridge_slave_1 entered promiscuous mode [ 267.893550][ T8524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.903794][ T8524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.921913][ T8524] team0: Port device team_slave_0 added [ 267.928209][ T8524] team0: Port device team_slave_1 added [ 267.941620][ T8524] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.948636][ T8524] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.974605][ T8524] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.995370][ T8524] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.002313][ T8524] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.029553][ T8524] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.052086][ T8524] device hsr_slave_0 entered promiscuous mode [ 268.058677][ T8524] device hsr_slave_1 entered promiscuous mode [ 268.065298][ T8524] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.073039][ T8524] Cannot create hsr debugfs directory [ 268.132507][ T8524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.142390][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.150254][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.159294][ T8524] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.168541][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.177230][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.186040][ T1915] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.193124][ T1915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.200991][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.210154][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.219565][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.227856][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.234876][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.247042][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.256662][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.270255][ T8524] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 268.280659][ T8524] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.291944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.300479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.309050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.317583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.326002][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.334038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.344035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.352149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.360452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.368112][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.380352][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.387798][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.397533][ T8524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.441794][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.482796][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.491453][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.499158][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.506899][ T8524] device veth0_vlan entered promiscuous mode [ 268.515882][ T8524] device veth1_vlan entered promiscuous mode [ 268.527980][ T8524] device veth0_macvtap entered promiscuous mode [ 268.534827][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.542909][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.550928][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.559382][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 268.568428][ T8524] device veth1_macvtap entered promiscuous mode [ 268.579781][ T8524] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 268.587786][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.596305][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.608231][ T8524] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 268.615673][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.624178][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.662674][ T8553] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 268.679489][ T8553] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.691280][ T8553] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.699167][ T8553] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.709822][ T8553] device bridge_slave_0 left promiscuous mode [ 268.716220][ T8553] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.727282][ T8553] device bridge_slave_1 left promiscuous mode [ 268.733633][ T8553] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.744168][ T8553] bond0: (slave bond_slave_0): Releasing backup interface [ 268.764424][ T8553] bond0: (slave bond_slave_1): Releasing backup interface [ 268.811438][ T8553] team0: Port device team_slave_0 removed [ 268.843474][ T8553] team0: Port device team_slave_1 removed [ 268.851480][ T8553] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:19:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(0x0, &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 268.859141][ T8553] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 268.868541][ T8553] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 268.876582][ T8553] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 268.967526][ T8558] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 268.992309][ T8558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.000644][ T8558] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 269.094379][ T8562] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.109344][ T8562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.120217][ T8562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.189605][ T8563] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.203678][ T8563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.211672][ T8563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.261880][ T8561] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.290755][ T8561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.299470][ T8561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(0x0, &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) [ 269.517036][ T8582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.558552][ T8582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.576832][ T8582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 269.685892][ T8581] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.707221][ T8581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.721041][ T8581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 269.782277][ T8583] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 269.825287][ T8583] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.839190][ T8583] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(0x0, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 269.973133][ T8585] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.006685][ T8585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.014942][ T8585] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 270.124572][ T8589] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.152042][ T8589] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.161029][ T8589] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 270.208402][ T8591] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.220526][ T8591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.230750][ T8591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 270.275377][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.298224][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.306157][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) [ 270.399694][ T8597] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.414120][ T8597] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.422503][ T8597] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 270.492678][ T8599] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.520328][ T8599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.528539][ T8599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.577306][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.589023][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.597478][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.659619][ T8604] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.674046][ T8604] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.682071][ T8604] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.746284][ T8607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 270.760584][ T8607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.768381][ T8607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.186963][ T5877] device hsr_slave_0 left promiscuous mode [ 271.193298][ T5877] device hsr_slave_1 left promiscuous mode [ 271.202163][ T5877] device veth1_macvtap left promiscuous mode [ 271.208340][ T5877] device veth0_macvtap left promiscuous mode [ 271.214423][ T5877] device veth1_vlan left promiscuous mode [ 271.220407][ T5877] device veth0_vlan left promiscuous mode [ 271.321922][ T5877] bond0 (unregistering): Released all slaves [ 271.407152][ T8609] chnl_net:caif_netlink_parms(): no params data found [ 271.439346][ T8609] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.446412][ T8609] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.454817][ T8609] device bridge_slave_0 entered promiscuous mode [ 271.461946][ T8609] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.468976][ T8609] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.476426][ T8609] device bridge_slave_1 entered promiscuous mode [ 271.491754][ T8609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.501966][ T8609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.519867][ T8609] team0: Port device team_slave_0 added [ 271.527381][ T8609] team0: Port device team_slave_1 added [ 271.540340][ T8609] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 271.547407][ T8609] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.573311][ T8609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 271.584484][ T8609] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 271.591438][ T8609] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 271.617352][ T8609] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 271.641542][ T8609] device hsr_slave_0 entered promiscuous mode [ 271.648096][ T8609] device hsr_slave_1 entered promiscuous mode [ 271.654408][ T8609] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 271.662265][ T8609] Cannot create hsr debugfs directory [ 271.717933][ T8609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.728513][ T8609] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.736342][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.744191][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.753473][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.762177][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.770569][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.777644][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.794528][ T8609] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 271.804951][ T8609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 271.817423][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.825520][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.834176][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.842495][ T1915] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.849532][ T1915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.857282][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.866163][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.874753][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.883160][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.891748][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.900041][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.908496][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.916774][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.930654][ T8609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.939912][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 271.947652][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.955818][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.963125][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.998448][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.037453][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.045919][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.053414][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.062065][ T8609] device veth0_vlan entered promiscuous mode [ 272.071370][ T8609] device veth1_vlan entered promiscuous mode [ 272.083066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 272.091737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 272.100057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.110122][ T8609] device veth0_macvtap entered promiscuous mode [ 272.118008][ T8609] device veth1_macvtap entered promiscuous mode [ 272.128629][ T8609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 272.135910][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 272.144185][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.152885][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.162927][ T8609] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 272.170436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.178873][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.213358][ T8637] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 272.227116][ T8637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.236584][ T8637] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.243992][ T8637] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.252468][ T8637] device bridge_slave_0 left promiscuous mode [ 272.258612][ T8637] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.266871][ T8637] device bridge_slave_1 left promiscuous mode [ 272.272964][ T8637] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.281617][ T8637] bond0: (slave bond_slave_0): Releasing backup interface [ 272.297944][ T8637] bond0: (slave bond_slave_1): Releasing backup interface [ 272.341336][ T8637] team0: Port device team_slave_0 removed [ 272.356830][ T8637] team0: Port device team_slave_1 removed [ 272.364411][ T8637] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 272.371910][ T8637] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 272.380342][ T8637] batman_adv: batadv0: Interface deactivated: batadv_slave_1 23:19:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 272.387901][ T8637] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 272.449473][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.460428][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.468261][ T8642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 272.536587][ T8644] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.574473][ T8644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 23:19:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 272.583024][ T8644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.696460][ T8645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.711134][ T8645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.719270][ T8645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.760516][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.771895][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.780601][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 272.860270][ T8653] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 272.873628][ T8653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.881851][ T8653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:05 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 273.022081][ T8667] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.050877][ T8667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.059255][ T8667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 23:19:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 273.270801][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 273.316747][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.326212][ T8668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 273.430771][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.448414][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.470527][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 273.600729][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.651870][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.671167][ T8670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 273.730400][ T8680] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.743087][ T8680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.751882][ T8680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.821195][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.836518][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.844220][ T8686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.890799][ T8690] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.913090][ T8690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.920640][ T8690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 273.974226][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 273.989075][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.997169][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 274.436697][ T5877] device hsr_slave_0 left promiscuous mode [ 274.442873][ T5877] device hsr_slave_1 left promiscuous mode [ 274.450701][ T5877] device veth1_macvtap left promiscuous mode [ 274.456699][ T5877] device veth0_macvtap left promiscuous mode [ 274.462792][ T5877] device veth1_vlan left promiscuous mode [ 274.468656][ T5877] device veth0_vlan left promiscuous mode [ 274.569003][ T5877] bond0 (unregistering): Released all slaves [ 274.888262][ T8696] chnl_net:caif_netlink_parms(): no params data found [ 274.917088][ T8696] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.924257][ T8696] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.932048][ T8696] device bridge_slave_0 entered promiscuous mode [ 274.940157][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.947271][ T8696] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.955567][ T8696] device bridge_slave_1 entered promiscuous mode [ 274.971715][ T8696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.982185][ T8696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.001287][ T8696] team0: Port device team_slave_0 added [ 275.007702][ T8696] team0: Port device team_slave_1 added [ 275.022672][ T8696] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 275.029687][ T8696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.055605][ T8696] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 275.067129][ T8696] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 275.074065][ T8696] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 275.100058][ T8696] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 275.122919][ T8696] device hsr_slave_0 entered promiscuous mode [ 275.129345][ T8696] device hsr_slave_1 entered promiscuous mode [ 275.135862][ T8696] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 275.143390][ T8696] Cannot create hsr debugfs directory [ 275.177721][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.184822][ T8696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.192062][ T8696] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.199085][ T8696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.226310][ T8696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.237712][ T8696] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.245305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.253132][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.261195][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.275209][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.283500][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.290657][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.298345][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.306624][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.313627][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.331350][ T8696] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 275.341692][ T8696] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 275.356561][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.365250][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.373667][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.382208][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.390359][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.398043][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.410876][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.419256][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.429411][ T8696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 275.474366][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 275.517321][ T8696] device veth0_vlan entered promiscuous mode [ 275.525616][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.534063][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.541871][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.550635][ T8696] device veth1_vlan entered promiscuous mode [ 275.564418][ T8696] device veth0_macvtap entered promiscuous mode [ 275.571572][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 275.579627][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 275.587884][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.596215][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.605875][ T8696] device veth1_macvtap entered promiscuous mode [ 275.617456][ T8696] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.626584][ T8696] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 275.634182][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.643202][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.679640][ T8726] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 275.693302][ T8726] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.702664][ T8726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.710338][ T8726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 275.719286][ T8726] device bridge_slave_0 left promiscuous mode [ 275.725466][ T8726] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.733412][ T8726] device bridge_slave_1 left promiscuous mode [ 275.740125][ T8726] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.748583][ T8726] bond0: (slave bond_slave_0): Releasing backup interface [ 275.768136][ T8726] bond0: (slave bond_slave_1): Releasing backup interface [ 275.796241][ T8726] team0: Port device team_slave_0 removed [ 275.833847][ T8726] team0: Port device team_slave_1 removed 23:19:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:19:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 275.840461][ T8726] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 275.847981][ T8726] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 275.856228][ T8726] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 275.863597][ T8726] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) [ 275.919298][ T8736] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.4'. [ 275.936297][ T8735] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.947081][ T8735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 275.956515][ T8735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 275.985200][ T8732] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 275.997446][ T8732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.006543][ T8732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.066161][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.080090][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.088411][ T8733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.197838][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.212220][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.220289][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 23:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.271170][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.297895][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.311365][ T8741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.340983][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.357068][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.364575][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.418534][ T8745] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.431701][ T8745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.439999][ T8745] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.527030][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.553627][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.562618][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 276.710318][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.746234][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.766034][ T8755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 276.841533][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 276.874273][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 276.896077][ T8754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 277.001596][ T8757] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.050396][ T8757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.064206][ T8757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 277.141854][ T8759] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.157451][ T8759] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.165787][ T8759] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 277.243010][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.270684][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.278804][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 277.322031][ T8763] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.334537][ T8763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.343072][ T8763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 277.365318][ T8772] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.4'. [ 277.409434][ T8772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.423141][ T8772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.431863][ T8772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 277.477029][ T8765] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.489058][ T8765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.499560][ T8765] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.548893][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.569526][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.577695][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 277.651745][ T8770] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.669521][ T8770] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.677310][ T8770] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.727262][ T8774] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.739254][ T8774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.747381][ T8774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.819462][ T8776] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.829963][ T8776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.837948][ T8776] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 277.889779][ T8778] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 277.902886][ T8778] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 277.911770][ T8778] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.278919][ T8780] chnl_net:caif_netlink_parms(): no params data found [ 278.313875][ T43] device hsr_slave_0 left promiscuous mode [ 278.320415][ T43] device hsr_slave_1 left promiscuous mode [ 278.328445][ T43] device veth1_macvtap left promiscuous mode [ 278.334413][ T43] device veth0_macvtap left promiscuous mode [ 278.341881][ T43] device veth1_vlan left promiscuous mode [ 278.347758][ T43] device veth0_vlan left promiscuous mode [ 278.444961][ T43] bond0 (unregistering): Released all slaves [ 278.487519][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.494625][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.502197][ T8780] device bridge_slave_0 entered promiscuous mode [ 278.509703][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.516745][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.526378][ T8780] device bridge_slave_1 entered promiscuous mode [ 278.541753][ T8780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.552139][ T8780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.569389][ T8780] team0: Port device team_slave_0 added [ 278.575631][ T8780] team0: Port device team_slave_1 added [ 278.588844][ T8780] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.595805][ T8780] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.621873][ T8780] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.633488][ T8780] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.640514][ T8780] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.666810][ T8780] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 278.687010][ T8780] device hsr_slave_0 entered promiscuous mode [ 278.693412][ T8780] device hsr_slave_1 entered promiscuous mode [ 278.699947][ T8780] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 278.707641][ T8780] Cannot create hsr debugfs directory [ 278.734541][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.741602][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.748921][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.755957][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.780836][ T8780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.790774][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.799587][ T1912] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.807357][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.818618][ T8780] 8021q: adding VLAN 0 to HW filter on device team0 [ 278.828264][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.836602][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.843619][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.862490][ T8780] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 278.873183][ T8780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 278.888819][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.897350][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.904366][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.913333][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.921936][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.930696][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.939082][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.953342][ T8780] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.962319][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 278.969879][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 278.977343][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 278.985094][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.029743][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.069749][ T8780] device veth0_vlan entered promiscuous mode [ 279.077616][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.086211][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.093829][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.103647][ T8780] device veth1_vlan entered promiscuous mode [ 279.116047][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 279.124215][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 279.132312][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.141888][ T8780] device veth0_macvtap entered promiscuous mode [ 279.159086][ T8780] device veth1_macvtap entered promiscuous mode [ 279.170014][ T8780] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.178244][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.187348][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 279.201316][ T8780] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.212673][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.251135][ T8808] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.263998][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.273764][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.281354][ T8808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.291292][ T8808] device bridge_slave_0 left promiscuous mode [ 279.297495][ T8808] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.305393][ T8808] device bridge_slave_1 left promiscuous mode [ 279.311480][ T8808] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.321103][ T8808] bond0: (slave bond_slave_0): Releasing backup interface [ 279.337834][ T8808] bond0: (slave bond_slave_1): Releasing backup interface [ 279.355583][ T8808] team0: Port device team_slave_0 removed [ 279.384841][ T8808] team0: Port device team_slave_1 removed [ 279.391448][ T8808] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 279.398950][ T8808] batman_adv: batadv0: Removing interface: batadv_slave_0 23:19:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:19:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 279.407751][ T8808] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 279.415221][ T8808] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 279.473498][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.486317][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.493786][ T8813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 279.526747][ T8812] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.551256][ T8812] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.564398][ T8812] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 279.673096][ T8814] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.732395][ T8814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.740870][ T8814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.863009][ T8816] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.889777][ T8816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 279.906185][ T8816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.090314][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.092176][ T8824] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.101299][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.115631][ T8818] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.147934][ T8820] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.166458][ T8820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.173914][ T8820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.222912][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.249484][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.257297][ T8822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.323660][ T8824] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.343075][ T8824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.351447][ T8824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.400475][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.427718][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 280.451676][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.537359][ T8828] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.561669][ T8828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.576725][ T8828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.650548][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.704904][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 280.712330][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 280.995938][ T43] device hsr_slave_0 left promiscuous mode [ 281.001917][ T43] device hsr_slave_1 left promiscuous mode [ 281.009309][ T43] device veth1_macvtap left promiscuous mode [ 281.015316][ T43] device veth0_macvtap left promiscuous mode [ 281.021308][ T43] device veth1_vlan left promiscuous mode [ 281.027040][ T43] device veth0_vlan left promiscuous mode [ 281.147942][ T43] bond0 (unregistering): Released all slaves [ 281.288384][ T8832] chnl_net:caif_netlink_parms(): no params data found [ 281.318691][ T8832] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.325819][ T8832] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.333351][ T8832] device bridge_slave_0 entered promiscuous mode [ 281.341604][ T8832] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.348648][ T8832] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.356380][ T8832] device bridge_slave_1 entered promiscuous mode [ 281.374026][ T8832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.384555][ T8832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.403834][ T8832] team0: Port device team_slave_0 added [ 281.410608][ T8832] team0: Port device team_slave_1 added [ 281.423201][ T8832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 281.430160][ T8832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.456143][ T8832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 281.467361][ T8832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 281.474302][ T8832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.500201][ T8832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 281.524084][ T8832] device hsr_slave_0 entered promiscuous mode [ 281.530891][ T8832] device hsr_slave_1 entered promiscuous mode [ 281.540519][ T8832] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 281.548129][ T8832] Cannot create hsr debugfs directory [ 281.584562][ T8832] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.591618][ T8832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.598971][ T8832] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.606051][ T8832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.618635][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.626698][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.654142][ T8832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.665047][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.672737][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.682700][ T8832] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.691246][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.699876][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.708176][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.715259][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.725796][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.734339][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.742751][ T1917] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.749976][ T1917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.759834][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 281.774432][ T8832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 281.784873][ T8832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 281.796384][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 281.805135][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 281.813443][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.821978][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 281.830790][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.839104][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.847322][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.855622][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.863880][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.872082][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.879869][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.895111][ T8832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 281.904259][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 281.911873][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 281.972701][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.981437][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.060268][ T8832] device veth0_vlan entered promiscuous mode [ 282.067609][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.076215][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.085301][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.092987][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.101721][ T8832] device veth1_vlan entered promiscuous mode [ 282.123941][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 282.131912][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 282.140202][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.148898][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.169236][ T8832] device veth0_macvtap entered promiscuous mode [ 282.190138][ T8832] device veth1_macvtap entered promiscuous mode [ 282.203978][ T8832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 282.212557][ T8832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 282.219892][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 282.228595][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.236490][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.245918][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.254516][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.262892][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.296397][ T8857] chnl_net:caif_netlink_parms(): no params data found [ 282.350106][ T8857] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.357293][ T8857] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.365183][ T8857] device bridge_slave_0 entered promiscuous mode [ 282.380258][ T8874] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 282.392306][ T8874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.400211][ T8874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 282.410751][ T8874] device bridge_slave_0 left promiscuous mode [ 282.417201][ T8874] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.427847][ T8874] device bridge_slave_1 left promiscuous mode [ 282.434229][ T8874] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.445349][ T8874] bond0: (slave bond_slave_0): Releasing backup interface [ 282.464357][ T8874] bond0: (slave bond_slave_1): Releasing backup interface [ 282.499647][ T8874] team0: Port device team_slave_0 removed [ 282.527306][ T8874] team0: Port device team_slave_1 removed [ 282.538444][ T8874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 282.546032][ T8874] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 282.560554][ T8874] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 282.568205][ T8874] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 282.591932][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.599026][ T8857] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.610682][ T8857] device bridge_slave_1 entered promiscuous mode [ 282.670139][ T8879] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 282.681183][ T8879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.691173][ T8879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 282.778290][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 282.832704][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 282.850766][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 282.952687][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:19:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 282.994572][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.006624][ T8881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 283.168524][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.192318][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.200528][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 283.239420][ T8857] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.262238][ T8886] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.275567][ T8886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.283035][ T8886] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 283.321641][ T8888] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.344064][ T8888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.352079][ T8888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.398450][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.412051][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.419561][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.445571][ T8857] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.488033][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.503438][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.511126][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.552963][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.565623][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.573073][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.653233][ T8857] team0: Port device team_slave_0 added [ 283.660478][ T8857] team0: Port device team_slave_1 added [ 283.674110][ T8857] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 283.681203][ T8857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.707133][ T8857] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 283.719473][ T8857] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 283.726464][ T8857] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 283.752765][ T8857] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 283.796745][ T8857] device hsr_slave_0 entered promiscuous mode [ 283.803135][ T8857] device hsr_slave_1 entered promiscuous mode [ 283.809622][ T8857] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 283.818271][ T8857] Cannot create hsr debugfs directory [ 283.870855][ T8857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.880609][ T43] device hsr_slave_0 left promiscuous mode [ 283.886802][ T43] device hsr_slave_1 left promiscuous mode [ 283.894045][ T43] device hsr_slave_0 left promiscuous mode [ 283.901379][ T43] device hsr_slave_1 left promiscuous mode [ 283.910456][ T43] device veth1_macvtap left promiscuous mode [ 283.916529][ T43] device veth0_macvtap left promiscuous mode [ 283.922508][ T43] device veth1_vlan left promiscuous mode [ 283.928326][ T43] device veth0_vlan left promiscuous mode [ 283.936387][ T43] device veth1_macvtap left promiscuous mode [ 283.942658][ T43] device veth0_macvtap left promiscuous mode [ 283.948925][ T43] device veth1_vlan left promiscuous mode [ 283.954750][ T43] device veth0_vlan left promiscuous mode [ 284.099274][ T43] bond0 (unregistering): Released all slaves [ 284.222455][ T43] bond0 (unregistering): Released all slaves [ 284.284019][ T8857] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.291807][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.299688][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.309073][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.319404][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.327856][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.334930][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.343652][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.357654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.366127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.374286][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.381317][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.390202][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.399432][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.415455][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.423912][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.432528][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.441018][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.449711][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.461228][ T8857] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 284.471838][ T8857] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.484219][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.492646][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.501122][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.526089][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.533430][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.546311][ T8857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.578248][ T8897] chnl_net:caif_netlink_parms(): no params data found [ 284.614895][ T8897] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.622029][ T8897] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.629662][ T8897] device bridge_slave_0 entered promiscuous mode [ 284.638020][ T8897] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.645070][ T8897] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.652492][ T8897] device bridge_slave_1 entered promiscuous mode [ 284.670581][ T8897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.681758][ T8897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.691272][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.710876][ T8897] team0: Port device team_slave_0 added [ 284.717425][ T8897] team0: Port device team_slave_1 added [ 284.732810][ T8897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 284.739766][ T8897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.765636][ T8897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 284.783695][ T8897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 284.790760][ T8897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.816825][ T8897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 284.835038][ T8857] device veth0_vlan entered promiscuous mode [ 284.841454][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.849595][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.864852][ T8897] device hsr_slave_0 entered promiscuous mode [ 284.871234][ T8897] device hsr_slave_1 entered promiscuous mode [ 284.877707][ T8897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 284.885723][ T8897] Cannot create hsr debugfs directory [ 284.891354][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.900082][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.909741][ T8857] device veth1_vlan entered promiscuous mode [ 284.923183][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.932090][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.940838][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.949817][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.959732][ T8857] device veth0_macvtap entered promiscuous mode [ 284.968109][ T8857] device veth1_macvtap entered promiscuous mode [ 284.987586][ T8857] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 284.995948][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 285.003771][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.012740][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.021274][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.036909][ T8857] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.046083][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.054481][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.117580][ T8897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.129592][ T8925] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 285.135185][ T8897] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.147037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.154520][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.167271][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.179276][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.187135][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.198884][ T8925] device bridge_slave_0 left promiscuous mode [ 285.205214][ T8925] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.215056][ T8925] device bridge_slave_1 left promiscuous mode [ 285.221402][ T8925] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.231805][ T8925] bond0: (slave bond_slave_0): Releasing backup interface [ 285.252238][ T8925] bond0: (slave bond_slave_1): Releasing backup interface [ 285.282057][ T8925] team0: Port device team_slave_0 removed [ 285.309100][ T8925] team0: Port device team_slave_1 removed [ 285.319518][ T8925] batman_adv: batadv0: Interface deactivated: batadv_slave_0 23:19:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 285.327275][ T8925] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 285.337733][ T8925] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 285.345424][ T8925] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 285.412322][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.430209][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.448669][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.455797][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.481353][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.499691][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.516705][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.523763][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.546576][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.564112][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.581691][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.600188][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.617441][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.635754][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.655717][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.663768][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.690481][ T8930] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.717343][ T8930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.732573][ T8930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 285.851424][ T8931] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.876864][ T8931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.884471][ T8931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.952075][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.966604][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.974434][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.067306][ T8897] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 286.077738][ T8897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 286.093814][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.103148][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.116588][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.127790][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.135515][ T8933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.162122][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.177515][ T8897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.184939][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.192352][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.242720][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.251407][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.307064][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.315557][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.324373][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.332033][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.340653][ T8897] device veth0_vlan entered promiscuous mode [ 286.356033][ T8897] device veth1_vlan entered promiscuous mode [ 286.367664][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 286.375663][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 286.383455][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.391874][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.401501][ T8897] device veth0_macvtap entered promiscuous mode [ 286.413491][ T8897] device veth1_macvtap entered promiscuous mode [ 286.433291][ T8897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.440687][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.449602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.457509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.466796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.483820][ T8897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.492334][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.500847][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.544349][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.557018][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.565020][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.575270][ T8948] device bridge_slave_0 left promiscuous mode [ 286.581528][ T8948] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.591633][ T8948] device bridge_slave_1 left promiscuous mode [ 286.598059][ T8948] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.607465][ T8948] bond0: (slave bond_slave_0): Releasing backup interface [ 286.627455][ T8948] bond0: (slave bond_slave_1): Releasing backup interface [ 286.670512][ T8948] team0: Port device team_slave_0 removed [ 286.690304][ T8948] team0: Port device team_slave_1 removed [ 286.697699][ T8948] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 286.705129][ T8948] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 286.713322][ T8948] batman_adv: batadv0: Interface deactivated: batadv_slave_1 23:19:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 286.720795][ T8948] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 286.805474][ T8953] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.818215][ T8953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.825781][ T8953] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.923487][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.000277][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.040458][ T8954] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 287.279322][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.335468][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.345502][ T8950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 287.399416][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.410199][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.418595][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.450173][ T8959] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.465140][ T8959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.472617][ T8959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.531959][ T8965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.552469][ T8965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.561001][ T8965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.637424][ T8967] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.650750][ T8967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.658893][ T8967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.823558][ T8960] chnl_net:caif_netlink_parms(): no params data found [ 287.852853][ T43] device hsr_slave_0 left promiscuous mode [ 287.859081][ T43] device hsr_slave_1 left promiscuous mode [ 287.866574][ T43] device hsr_slave_0 left promiscuous mode [ 287.872516][ T43] device hsr_slave_1 left promiscuous mode [ 287.881740][ T43] device veth1_macvtap left promiscuous mode [ 287.887777][ T43] device veth0_macvtap left promiscuous mode [ 287.893781][ T43] device veth1_vlan left promiscuous mode [ 287.899608][ T43] device veth0_vlan left promiscuous mode [ 287.907585][ T43] device veth1_macvtap left promiscuous mode [ 287.913550][ T43] device veth0_macvtap left promiscuous mode [ 287.919616][ T43] device veth1_vlan left promiscuous mode [ 287.925425][ T43] device veth0_vlan left promiscuous mode [ 288.070962][ T43] bond0 (unregistering): Released all slaves [ 288.154483][ T43] bond0 (unregistering): Released all slaves [ 288.190336][ T8960] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.197913][ T8960] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.205778][ T8960] device bridge_slave_0 entered promiscuous mode [ 288.212688][ T8960] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.219766][ T8960] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.227718][ T8960] device bridge_slave_1 entered promiscuous mode [ 288.243738][ T8960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.254129][ T8960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.271843][ T8960] team0: Port device team_slave_0 added [ 288.278094][ T8960] team0: Port device team_slave_1 added [ 288.291350][ T8960] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.298311][ T8960] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.324269][ T8960] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.335505][ T8960] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.344558][ T8960] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.370478][ T8960] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.396623][ T8960] device hsr_slave_0 entered promiscuous mode [ 288.403129][ T8960] device hsr_slave_1 entered promiscuous mode [ 288.460074][ T8960] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.467128][ T8960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.474394][ T8960] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.481434][ T8960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.520626][ T8960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.531186][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.539879][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.547832][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.561290][ T8960] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.570016][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.579879][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.588180][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.595397][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.611849][ T8960] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 288.622320][ T8960] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 288.634620][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.643170][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.651627][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.658738][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.666462][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.675307][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.683898][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.692403][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.700864][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 288.709299][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.717841][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.726123][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.734792][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.742965][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.751432][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.759170][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.778422][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.785859][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.809078][ T8960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.835222][ T8980] chnl_net:caif_netlink_parms(): no params data found [ 288.873290][ T8980] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.880372][ T8980] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.888180][ T8980] device bridge_slave_0 entered promiscuous mode [ 288.895549][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.904169][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.913113][ T8980] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.920206][ T8980] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.928247][ T8980] device bridge_slave_1 entered promiscuous mode [ 288.946573][ T8980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.957214][ T8980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.980020][ T8980] team0: Port device team_slave_0 added [ 288.987218][ T8980] team0: Port device team_slave_1 added [ 288.995398][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.003480][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.012750][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.020431][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.035514][ T8960] device veth0_vlan entered promiscuous mode [ 289.051035][ T8960] device veth1_vlan entered promiscuous mode [ 289.058139][ T8980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.065180][ T8980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.091207][ T8980] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.110789][ T8960] device veth0_macvtap entered promiscuous mode [ 289.118142][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 289.126289][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 289.134049][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 289.142747][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.151646][ T8980] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.158618][ T8980] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.184676][ T8980] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.210699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 289.219048][ T8960] device veth1_macvtap entered promiscuous mode [ 289.238140][ T8980] device hsr_slave_0 entered promiscuous mode [ 289.244607][ T8980] device hsr_slave_1 entered promiscuous mode [ 289.251574][ T8980] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.260492][ T8980] Cannot create hsr debugfs directory [ 289.268966][ T8960] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 289.276318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 289.285273][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.293931][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.319471][ T8960] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 289.326951][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.336550][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 289.389866][ T9009] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.0'. [ 289.394939][ T8980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.414088][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 289.426995][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 289.437009][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 289.448652][ T9009] device bridge_slave_0 left promiscuous mode [ 289.455220][ T9009] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.464378][ T9009] device bridge_slave_1 left promiscuous mode [ 289.470877][ T9009] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.481406][ T9009] bond0: (slave bond_slave_0): Releasing backup interface [ 289.503512][ T9009] bond0: (slave bond_slave_1): Releasing backup interface [ 289.551837][ T9009] team0: Port device team_slave_0 removed [ 289.576626][ T9009] team0: Port device team_slave_1 removed [ 289.587111][ T9009] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 289.594992][ T9009] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 289.610072][ T9009] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 289.617818][ T9009] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:22 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 289.662059][ T8980] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.679820][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.698761][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.762099][ T9012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 289.815838][ T9012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 289.835284][ T9012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 290.019692][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.046837][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 290.085876][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.180213][ T9014] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.195652][ T9014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.203251][ T9014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 290.248049][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.256683][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.265088][ T1917] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.272219][ T1917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.292460][ T8980] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 290.302843][ T8980] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 290.333958][ T9018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.348919][ T9018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.356889][ T9018] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.399599][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.412697][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.420956][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.486629][ T9022] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 290.502724][ T9022] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.510924][ T9022] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.554755][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.562720][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.571590][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.580124][ T4580] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.587294][ T4580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.595245][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.603789][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.612838][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.621467][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.629948][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.638760][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.647252][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.655913][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.664183][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.672674][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.680828][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.688263][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.702391][ T8980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.709514][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.717510][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.761251][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.770004][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.808006][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.816287][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.824594][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.832371][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.843630][ T8980] device veth0_vlan entered promiscuous mode [ 290.853540][ T8980] device veth1_vlan entered promiscuous mode [ 290.865234][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 290.873115][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 290.881119][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.889473][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.902185][ T8980] device veth0_macvtap entered promiscuous mode [ 290.910362][ T8980] device veth1_macvtap entered promiscuous mode [ 290.921148][ T8980] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 290.929677][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 290.937743][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 290.946577][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.956069][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.971021][ T8980] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 290.978342][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.987070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.027295][ T9038] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 291.048743][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.060828][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.069278][ T9038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.080133][ T9038] device bridge_slave_0 left promiscuous mode [ 291.086421][ T9038] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.097056][ T9038] device bridge_slave_1 left promiscuous mode [ 291.104985][ T9038] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.117324][ T9038] bond0: (slave bond_slave_0): Releasing backup interface [ 291.155657][ T9038] bond0: (slave bond_slave_1): Releasing backup interface [ 291.236001][ T9038] team0: Port device team_slave_0 removed 23:19:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 291.280775][ T9038] team0: Port device team_slave_1 removed [ 291.288991][ T9038] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 291.296622][ T9038] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 291.307055][ T9038] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 291.314886][ T9038] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40), 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 291.418915][ T9045] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.446143][ T9045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.454498][ T9045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.544380][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.574149][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:23 executing program 5: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 291.592160][ T9050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.658612][ T43] device hsr_slave_0 left promiscuous mode [ 291.668364][ T43] device hsr_slave_1 left promiscuous mode [ 291.686869][ T43] device veth1_macvtap left promiscuous mode [ 291.692989][ T43] device veth0_macvtap left promiscuous mode [ 291.699028][ T43] device veth1_vlan left promiscuous mode 23:19:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40), 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 291.704785][ T43] device veth0_vlan left promiscuous mode [ 291.916513][ T43] bond0 (unregistering): Released all slaves 23:19:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 291.986093][ T9049] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 292.001696][ T9049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.009773][ T9049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.118670][ T9052] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 292.132240][ T9052] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.140411][ T9052] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.189245][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 292.202729][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.210450][ T9054] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.265802][ T9058] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 292.280760][ T9058] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.288661][ T9058] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.381759][ T9040] chnl_net:caif_netlink_parms(): no params data found [ 292.420327][ T9040] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.427660][ T9040] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.435530][ T9040] device bridge_slave_0 entered promiscuous mode [ 292.442657][ T9040] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.449711][ T9040] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.457370][ T9040] device bridge_slave_1 entered promiscuous mode [ 292.473388][ T9040] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.484374][ T9040] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.503381][ T9040] team0: Port device team_slave_0 added [ 292.509770][ T9040] team0: Port device team_slave_1 added [ 292.524915][ T9040] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 292.531857][ T9040] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.558006][ T9040] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 292.571455][ T9040] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 292.578508][ T9040] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.604622][ T9040] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 292.627637][ T9040] device hsr_slave_0 entered promiscuous mode [ 292.634447][ T9040] device hsr_slave_1 entered promiscuous mode [ 292.641019][ T9040] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 292.648870][ T9040] Cannot create hsr debugfs directory [ 292.679907][ T9040] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.686975][ T9040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.694256][ T9040] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.701284][ T9040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.726763][ T9040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.738194][ T9040] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.746289][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.754345][ T1912] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.762483][ T1912] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.786499][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.794987][ T1912] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.802038][ T1912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.809883][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.818283][ T1912] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.825349][ T1912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.833914][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.842535][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.851118][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.859138][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.885185][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.893678][ T9040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.909895][ T9040] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.997331][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.008127][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.017624][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.052712][ T9040] device veth0_vlan entered promiscuous mode [ 293.060642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.069306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.077107][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.094886][ T9040] device veth1_vlan entered promiscuous mode [ 293.107306][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 293.115249][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 293.123196][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.134228][ T9040] device veth0_macvtap entered promiscuous mode [ 293.142922][ T9040] device veth1_macvtap entered promiscuous mode [ 293.162464][ T9040] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.170232][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.179526][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 293.192457][ T9040] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.209423][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.218715][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.244551][ T9040] ================================================================== [ 293.252635][ T9040] BUG: KCSAN: data-race in dev_get_tstats64 / udp_tunnel6_xmit_skb [ 293.260505][ T9040] [ 293.262804][ T9040] write to 0xffffe8ffffd35238 of 8 bytes by task 1850 on cpu 1: [ 293.270408][ T9040] udp_tunnel6_xmit_skb+0x3ac/0x4d0 [ 293.275587][ T9040] send6+0x2ef/0x3b0 [ 293.279474][ T9040] wg_socket_send_skb_to_peer+0xbb/0x130 [ 293.285081][ T9040] wg_socket_send_buffer_to_peer+0xf7/0x120 [ 293.290999][ T9040] wg_packet_handshake_send_worker+0x109/0x150 [ 293.297128][ T9040] process_one_work+0x3fc/0x980 [ 293.301957][ T9040] worker_thread+0x616/0xa70 [ 293.306525][ T9040] kthread+0x2c7/0x2e0 [ 293.310567][ T9040] ret_from_fork+0x1f/0x30 [ 293.314958][ T9040] [ 293.317272][ T9040] read to 0xffffe8ffffd35238 of 8 bytes by task 9040 on cpu 0: [ 293.324872][ T9040] dev_get_tstats64+0x149/0x1e0 [ 293.329706][ T9040] dev_get_stats+0x65/0x180 [ 293.334367][ T9040] rtnl_fill_stats+0x45/0x320 [ 293.339023][ T9040] rtnl_fill_ifinfo+0xebf/0x2560 [ 293.343949][ T9040] rtmsg_ifinfo_build_skb+0xa8/0x130 [ 293.349207][ T9040] rtmsg_ifinfo+0x58/0xc0 [ 293.353511][ T9040] __dev_notify_flags+0x63/0x3b0 [ 293.358424][ T9040] dev_change_flags+0xa2/0xc0 [ 293.363087][ T9040] do_setlink+0x810/0x2410 [ 293.367495][ T9040] rtnl_newlink+0xfad/0x13b0 [ 293.372059][ T9040] rtnetlink_rcv_msg+0x745/0x7e0 [ 293.376981][ T9040] netlink_rcv_skb+0x14e/0x250 [ 293.381732][ T9040] rtnetlink_rcv+0x18/0x20 [ 293.386137][ T9040] netlink_unicast+0x5fc/0x6c0 [ 293.390883][ T9040] netlink_sendmsg+0x6e1/0x7d0 [ 293.395637][ T9040] __sys_sendto+0x21e/0x2c0 [ 293.400141][ T9040] __x64_sys_sendto+0x74/0x90 [ 293.404808][ T9040] do_syscall_64+0x44/0xd0 [ 293.409217][ T9040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 293.415102][ T9040] [ 293.417495][ T9040] value changed: 0x0000000000000000 -> 0x0000000000000094 [ 293.424599][ T9040] [ 293.426921][ T9040] Reported by Kernel Concurrency Sanitizer on: [ 293.433042][ T9040] CPU: 0 PID: 9040 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 293.441836][ T9040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.451872][ T9040] ================================================================== [ 293.503585][ T9079] chnl_net:caif_netlink_parms(): no params data found [ 293.518474][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.529737][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.537852][ T9093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 293.548904][ T9093] device bridge_slave_0 left promiscuous mode [ 293.555244][ T9093] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.564559][ T9093] device bridge_slave_1 left promiscuous mode [ 293.571377][ T9093] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.584025][ T9093] bond0: (slave bond_slave_0): Releasing backup interface [ 293.604565][ T9093] bond0: (slave bond_slave_1): Releasing backup interface [ 293.639367][ T9093] team0: Port device team_slave_0 removed [ 293.675426][ T9093] team0: Port device team_slave_1 removed [ 293.683681][ T9093] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 293.691454][ T9093] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 293.702169][ T9093] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 293.709679][ T9093] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40), 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 293.846162][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.888132][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 293.906572][ T9099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 294.038946][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.085595][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.105313][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.227252][ T9079] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.234314][ T9079] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.243078][ T9079] device bridge_slave_0 entered promiscuous mode [ 294.264149][ T9102] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.275046][ T9102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.282537][ T9102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.363008][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.374341][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.381885][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.423743][ T9079] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.430835][ T9079] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.440070][ T9079] device bridge_slave_1 entered promiscuous mode [ 294.447909][ T9040] syz-executor.4 (9040) used greatest stack depth: 9520 bytes left [ 294.477109][ T9079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.488526][ T9079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 294.514792][ T9079] team0: Port device team_slave_0 added [ 294.521264][ T9079] team0: Port device team_slave_1 added [ 294.533737][ T9079] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 294.540686][ T9079] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 294.566670][ T9079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 294.578442][ T9079] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 294.585443][ T9079] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 294.611318][ T9079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 294.642530][ T9079] device hsr_slave_0 entered promiscuous mode [ 294.649279][ T9079] device hsr_slave_1 entered promiscuous mode [ 294.655951][ T9079] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 294.663484][ T9079] Cannot create hsr debugfs directory [ 294.677820][ T43] device hsr_slave_0 left promiscuous mode [ 294.683965][ T43] device hsr_slave_1 left promiscuous mode [ 294.691374][ T43] device hsr_slave_0 left promiscuous mode [ 294.698707][ T43] device hsr_slave_1 left promiscuous mode [ 294.707813][ T43] device veth1_macvtap left promiscuous mode [ 294.713787][ T43] device veth0_macvtap left promiscuous mode [ 294.719906][ T43] device veth1_vlan left promiscuous mode [ 294.725666][ T43] device veth0_vlan left promiscuous mode [ 294.733785][ T43] device veth1_macvtap left promiscuous mode [ 294.739790][ T43] device veth0_macvtap left promiscuous mode [ 294.745788][ T43] device veth1_vlan left promiscuous mode [ 294.751649][ T43] device veth0_vlan left promiscuous mode [ 294.894525][ T43] bond0 (unregistering): Released all slaves [ 294.965983][ T43] bond0 (unregistering): Released all slaves [ 295.051392][ T9079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.061762][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.073184][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.080815][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.089824][ T9079] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.098703][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.107249][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.115477][ T4580] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.122568][ T4580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.130826][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.139816][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.148498][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.156925][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.163946][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.177606][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.186147][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.198874][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.207515][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.217452][ T9079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.229766][ T9079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.238123][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.251530][ T9079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.259942][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.267446][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.328693][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.390436][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.398814][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.406610][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.415210][ T9079] device veth0_vlan entered promiscuous mode [ 295.424418][ T9079] device veth1_vlan entered promiscuous mode [ 295.435723][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.443678][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 295.454881][ T9079] device veth0_macvtap entered promiscuous mode [ 295.462543][ T9079] device veth1_macvtap entered promiscuous mode [ 295.470084][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.478385][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.486850][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.507429][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.524223][ T9079] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 295.538085][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.546756][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 295.566587][ T9079] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 295.577751][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 295.586015][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.597251][ T9117] chnl_net:caif_netlink_parms(): no params data found [ 295.644627][ T9117] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.651727][ T9117] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.661199][ T9117] device bridge_slave_0 entered promiscuous mode [ 295.678275][ T9117] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.685342][ T9117] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.693007][ T9117] device bridge_slave_1 entered promiscuous mode [ 295.726238][ T9134] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 295.748171][ T9134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.756607][ T9134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.771509][ T9134] device bridge_slave_0 left promiscuous mode [ 295.778117][ T9134] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.790196][ T9134] device bridge_slave_1 left promiscuous mode [ 295.796688][ T9134] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.807373][ T9134] bond0: (slave bond_slave_0): Releasing backup interface [ 295.829316][ T9134] bond0: (slave bond_slave_1): Releasing backup interface [ 295.879274][ T9134] team0: Port device team_slave_0 removed [ 295.907453][ T9134] team0: Port device team_slave_1 removed [ 295.914624][ T9134] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 295.922235][ T9134] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 295.931562][ T9134] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 295.939225][ T9134] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 295.957934][ T9117] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 23:19:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 295.975205][ T9117] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.022689][ T9117] team0: Port device team_slave_0 added [ 296.036302][ T9117] team0: Port device team_slave_1 added [ 296.072467][ T9136] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.098754][ T9136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.108024][ T9136] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.227908][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.259035][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:19:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 296.290298][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 296.357006][ T9140] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.388892][ T9140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.415038][ T9140] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 296.599611][ T9142] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.609993][ T9142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.617475][ T9142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.673693][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.688400][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.696294][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.749679][ T9117] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 296.756695][ T9117] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.782611][ T9117] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 296.809939][ T9146] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.820034][ T9146] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.827659][ T9146] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.850447][ T9117] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 296.857476][ T9117] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.883601][ T9117] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 296.910400][ T9117] device hsr_slave_0 entered promiscuous mode [ 296.918080][ T9117] device hsr_slave_1 entered promiscuous mode [ 296.983019][ T9117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.992994][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.001287][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.010219][ T9117] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.018359][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.026992][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.035587][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.042771][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.050795][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.096200][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.104786][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.113117][ T4580] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.120251][ T4580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.128041][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.136988][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.145580][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.153862][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.162318][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.170737][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.179163][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.189555][ T9117] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 297.201575][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.209496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.217535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.239794][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 297.247228][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.267895][ T9117] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.314010][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.361443][ T9117] device veth0_vlan entered promiscuous mode [ 297.368704][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.377248][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.384955][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.399679][ T9117] device veth1_vlan entered promiscuous mode [ 297.412458][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 297.420702][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 297.428792][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.438417][ T9117] device veth0_macvtap entered promiscuous mode [ 297.454426][ T9117] device veth1_macvtap entered promiscuous mode [ 297.466030][ T9117] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.473725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 297.481850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.490703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.509709][ T9117] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.517403][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.557660][ T9162] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 297.584614][ T9162] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.604263][ T9162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.613690][ T9162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 297.630763][ T9162] device bridge_slave_0 left promiscuous mode [ 297.637453][ T9162] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.653271][ T9162] device bridge_slave_1 left promiscuous mode [ 297.659917][ T9162] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.678346][ T9162] bond0: (slave bond_slave_0): Releasing backup interface [ 297.714980][ T9162] bond0: (slave bond_slave_1): Releasing backup interface [ 297.749885][ T9162] team0: Port device team_slave_0 removed 23:19:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 297.778617][ T9162] team0: Port device team_slave_1 removed [ 297.790397][ T9162] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 297.798155][ T9162] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 297.808241][ T9162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 297.815829][ T9162] batman_adv: batadv0: Removing interface: batadv_slave_1 23:19:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00'}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 297.927495][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 297.952743][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.961304][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 298.223854][ T9172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.239940][ T9172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 298.252868][ T9172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00'}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 298.376098][ T9174] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.428711][ T9174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 298.456139][ T9174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 298.648609][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.702212][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 298.721999][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 298.836230][ T9164] chnl_net:caif_netlink_parms(): no params data found [ 298.848310][ T43] device hsr_slave_0 left promiscuous mode [ 298.854440][ T43] device hsr_slave_1 left promiscuous mode [ 298.861997][ T43] device hsr_slave_0 left promiscuous mode [ 298.868150][ T43] device hsr_slave_1 left promiscuous mode [ 298.875983][ T43] device hsr_slave_0 left promiscuous mode [ 298.881958][ T43] device hsr_slave_1 left promiscuous mode [ 298.891607][ T43] device veth1_macvtap left promiscuous mode [ 298.897704][ T43] device veth0_macvtap left promiscuous mode [ 298.903828][ T43] device veth1_vlan left promiscuous mode [ 298.909636][ T43] device veth0_vlan left promiscuous mode [ 298.917439][ T43] device veth1_macvtap left promiscuous mode [ 298.923397][ T43] device veth0_macvtap left promiscuous mode [ 298.929417][ T43] device veth1_vlan left promiscuous mode [ 298.935153][ T43] device veth0_vlan left promiscuous mode [ 298.941499][ T43] device veth1_macvtap left promiscuous mode [ 298.947648][ T43] device veth0_macvtap left promiscuous mode [ 298.953624][ T43] device veth1_vlan left promiscuous mode [ 298.959584][ T43] device veth0_vlan left promiscuous mode [ 299.137549][ T43] bond0 (unregistering): Released all slaves [ 299.260266][ T43] bond0 (unregistering): Released all slaves [ 299.369015][ T43] bond0 (unregistering): Released all slaves [ 299.494778][ T9164] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.501880][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.509692][ T9164] device bridge_slave_0 entered promiscuous mode [ 299.517406][ T9164] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.524460][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.531993][ T9164] device bridge_slave_1 entered promiscuous mode [ 299.551529][ T9164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.562608][ T9164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.584422][ T9164] team0: Port device team_slave_0 added [ 299.590915][ T9164] team0: Port device team_slave_1 added [ 299.620614][ T9164] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 299.627795][ T9164] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 299.654272][ T9164] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 299.666570][ T9164] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 299.673497][ T9164] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 299.699748][ T9164] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 299.737594][ T9164] device hsr_slave_0 entered promiscuous mode [ 299.744131][ T9164] device hsr_slave_1 entered promiscuous mode [ 299.750556][ T9164] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 299.758495][ T9164] Cannot create hsr debugfs directory [ 299.768636][ T9183] chnl_net:caif_netlink_parms(): no params data found [ 299.820936][ T9183] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.828043][ T9183] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.837124][ T9183] device bridge_slave_0 entered promiscuous mode [ 299.852621][ T9164] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.859698][ T9164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.866941][ T9164] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.873989][ T9164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.883671][ T9183] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.890740][ T9183] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.899898][ T9183] device bridge_slave_1 entered promiscuous mode [ 299.932429][ T9183] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.942690][ T9183] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.962233][ T9183] team0: Port device team_slave_0 added [ 299.970859][ T9164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.978460][ T9183] team0: Port device team_slave_1 added [ 299.996588][ T9164] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.006724][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.015745][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.024495][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.034681][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 300.047273][ T9183] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.054213][ T9183] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.080409][ T9183] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.091531][ T9183] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.098604][ T9183] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.124512][ T9183] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.157805][ T9183] device hsr_slave_0 entered promiscuous mode [ 300.164247][ T9183] device hsr_slave_1 entered promiscuous mode [ 300.170564][ T9183] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 300.179148][ T9183] Cannot create hsr debugfs directory [ 300.189991][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.199445][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.218105][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.237602][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.251109][ T4623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.262930][ T9164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 300.305255][ T9201] chnl_net:caif_netlink_parms(): no params data found [ 300.313273][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 300.321081][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 300.332842][ T9164] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.368486][ T9183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.389452][ T9183] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.409690][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.419829][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.428450][ T1919] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.435497][ T1919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.444488][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.453174][ T1919] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.460230][ T1919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.470495][ T1919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.486809][ T9201] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.493847][ T9201] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.514907][ T9201] device bridge_slave_0 entered promiscuous mode [ 300.524939][ T9183] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 300.535802][ T9183] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 300.547865][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.556317][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.565613][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.573474][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.582016][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.590321][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.598555][ T9201] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.605694][ T9201] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.613169][ T9201] device bridge_slave_1 entered promiscuous mode [ 300.636399][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 300.649639][ T9183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.658034][ T9201] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.668072][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 300.675756][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 300.699216][ T9164] device veth0_vlan entered promiscuous mode [ 300.717248][ T9164] device veth1_vlan entered promiscuous mode [ 300.723784][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.732028][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.740781][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 300.751178][ T9201] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.761182][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.770030][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.783268][ T9164] device veth0_macvtap entered promiscuous mode [ 300.801745][ T9201] team0: Port device team_slave_0 added [ 300.808128][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 300.816247][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.824412][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.833202][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 300.842259][ T9164] device veth1_macvtap entered promiscuous mode [ 300.849933][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.859066][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.867690][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.877951][ T9201] team0: Port device team_slave_1 added [ 300.899332][ T9164] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 300.907083][ T9201] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.914018][ T9201] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.940024][ T9201] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.951202][ T9201] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.958195][ T9201] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.984055][ T9201] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.996072][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.004535][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.014540][ T9164] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 301.022227][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.030852][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.053270][ T9183] device veth0_vlan entered promiscuous mode [ 301.071405][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.079697][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.096529][ T9201] device hsr_slave_0 entered promiscuous mode [ 301.103050][ T9201] device hsr_slave_1 entered promiscuous mode [ 301.109829][ T9201] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.117618][ T9201] Cannot create hsr debugfs directory [ 301.123188][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.130738][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.144881][ T9183] device veth1_vlan entered promiscuous mode [ 301.162434][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 301.170427][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 301.184921][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.193403][ T1915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 23:19:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="f80000000103010200000008000340000000060800034000000004d4000b8074000680140005000000000000000000000000000000000114000400ff01000000000000000000000000000108000200ac1414bb2400038006000100000000000600020000000000060001004e200000060001000000000014000400fe8000000000000000000000000000aa08000200e00000013c0018800800024000000009080002400000000208000340000000740800014000000009080003400000080008000240000007ff0800034000000000100016400000000000000002000000060c001700000000020000000004000e80000000000000000000cba257f9c1b3973b812aae61918e6ee5c4fcf4226aa57ae6179a738372222cf91c02403ea6298d867348d3ff0f000000000000caa38dbda56385b23ff0e18b07d6"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 23:19:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00'}, 0x18) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 301.207246][ T9242] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.4'. [ 301.222150][ T9183] device veth0_macvtap entered promiscuous mode [ 301.289368][ T9245] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 301.317658][ T9245] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.326072][ T9245] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:19:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) lgetxattr(0x0, &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 301.425571][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 301.457762][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.472344][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.529426][ T9183] device veth1_macvtap entered promiscuous mode 23:19:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440), 0x1000) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'geneve1\x00', 0x1}, 0x18) mknodat$null(0xffffffffffffffff, 0x0, 0x66a78e1b74e44f22, 0x103) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 301.676355][ T9248] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 301.722123][ T9248] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.735418][ T9248] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.793960][ T9183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 301.804429][ T9183] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.815535][ T9183] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 301.825767][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 301.833606][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 301.841675][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.850235][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.863679][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 301.874132][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.882574][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.926210][ T9183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.936684][ T9183] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.950295][ T9183] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 301.964234][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.972922][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.018341][ T9201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.029921][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.038545][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.058629][ T9253] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 302.070027][ T9253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 302.077867][ T9253] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 302.088319][ T9253] device bridge_slave_0 left promiscuous mode [ 302.094580][ T9253] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.105853][ T9253] device bridge_slave_1 left promiscuous mode [ 302.112090][ T9253] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.123458][ T9253] bond0: (slave bond_slave_0): Releasing backup interface [ 302.145567][ T9253] bond0: (slave bond_slave_1): Releasing backup interface [ 302.187833][ T9253] team0: Port device team_slave_0 removed [ 302.221358][ T9253] team0: Port device team_slave_1 removed [ 302.228670][ T9253] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 302.236825][ T9253] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 302.246787][ T9253] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 302.254199][ T9253] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 302.290084][ T9201] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.305967][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.317516][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.326007][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.334351][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.343006][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.351621][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.360735][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.367903][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.375731][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.384409][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.394396][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.447644][ T9201] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 302.458280][ T9201] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 302.469700][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.478295][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.486963][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.495566][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.504207][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.512506][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.521106][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.529431][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.537873][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.545918][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 302.555934][ T1850] device hsr_slave_0 left promiscuous mode [ 302.561976][ T1850] device hsr_slave_1 left promiscuous mode [ 302.570024][ T1850] device veth1_macvtap left promiscuous mode [ 302.576064][ T1850] device veth0_macvtap left promiscuous mode [ 302.582071][ T1850] device veth1_vlan left promiscuous mode [ 302.588018][ T1850] device veth0_vlan left promiscuous mode [ 302.689278][ T1850] bond0 (unregistering): Released all slaves [ 302.738718][ T9201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.745846][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 302.753510][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 302.887566][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 302.896632][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 302.947634][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 302.955633][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.964245][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.972888][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.994815][ T9201] device veth0_vlan entered promiscuous mode [ 303.010487][ T9201] device veth1_vlan entered promiscuous mode [ 303.037329][ T9261] chnl_net:caif_netlink_parms(): no params data found [ 303.060682][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 303.068941][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 303.077114][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 303.086772][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 303.096157][ T9201] device veth0_macvtap entered promiscuous mode [ 303.103796][ T9201] device veth1_macvtap entered promiscuous mode [ 303.122923][ T9201] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 303.133378][ T9201] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 303.145121][ T9201] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 303.154858][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 303.162983][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 303.170843][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 303.179338][ T2004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 303.196720][ T9261] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.203748][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.211599][ T9261] device bridge_slave_0 entered promiscuous mode