Warning: Permanently added '10.128.1.149' (ED25519) to the list of known hosts. 2023/08/07 18:31:13 fuzzer started 2023/08/07 18:31:14 dialing manager at 10.128.0.163:30015 [ 39.515247][ T26] audit: type=1400 audit(1691433080.023:81): avc: denied { read } for pid=2751 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 41.725512][ T26] audit: type=1400 audit(1691433082.233:82): avc: denied { mounton } for pid=3072 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 41.726051][ T3072] cgroup: Unknown subsys name 'net' [ 41.748226][ T26] audit: type=1400 audit(1691433082.233:83): avc: denied { mount } for pid=3072 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.775608][ T26] audit: type=1400 audit(1691433082.263:84): avc: denied { unmount } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 41.909730][ T3072] cgroup: Unknown subsys name 'rlimit' [ 42.029707][ T26] audit: type=1400 audit(1691433082.543:85): avc: denied { mounton } for pid=3072 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 42.056360][ T26] audit: type=1400 audit(1691433082.543:86): avc: denied { mount } for pid=3072 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 42.067433][ T3074] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 42.079674][ T26] audit: type=1400 audit(1691433082.543:87): avc: denied { create } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.109113][ T26] audit: type=1400 audit(1691433082.543:88): avc: denied { write } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.129486][ T26] audit: type=1400 audit(1691433082.543:89): avc: denied { read } for pid=3072 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.130721][ T3072] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2023/08/07 18:31:22 syscalls: 2856 2023/08/07 18:31:22 code coverage: enabled 2023/08/07 18:31:22 comparison tracing: enabled 2023/08/07 18:31:22 extra coverage: enabled 2023/08/07 18:31:22 delay kcov mmap: enabled 2023/08/07 18:31:22 setuid sandbox: enabled 2023/08/07 18:31:22 namespace sandbox: enabled 2023/08/07 18:31:22 Android sandbox: enabled 2023/08/07 18:31:22 fault injection: enabled 2023/08/07 18:31:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/08/07 18:31:22 net packet injection: enabled 2023/08/07 18:31:22 net device setup: enabled 2023/08/07 18:31:22 concurrency sanitizer: enabled 2023/08/07 18:31:22 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/08/07 18:31:22 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/08/07 18:31:22 USB emulation: /dev/raw-gadget does not exist 2023/08/07 18:31:22 hci packet injection: /dev/vhci does not exist 2023/08/07 18:31:22 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/08/07 18:31:22 802.15.4 emulation: enabled 2023/08/07 18:31:22 swap file: enabled 2023/08/07 18:31:22 fetching corpus: 0, signal 0/0 (executing program) 2023/08/07 18:31:22 fetching corpus: 0, signal 0/0 (executing program) [ 42.149760][ T26] audit: type=1400 audit(1691433082.603:90): avc: denied { relabelto } for pid=3074 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2023/08/07 18:31:23 starting 6 fuzzer processes 18:31:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 18:31:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="58000000000703000000000000000000020000000c000340fffffffffffffff90c0003400000000000000fff0900010073"], 0x58}}, 0x0) 18:31:23 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f00000009c0)) 18:31:23 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:23 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) [ 43.447819][ T3064] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3064 'syz-fuzzer' [ 43.663018][ T3089] ================================================================== [ 43.671150][ T3089] BUG: KCSAN: data-race in __d_rehash / retain_dentry [ 43.678041][ T3089] [ 43.680377][ T3089] write to 0xffff888102383f10 of 8 bytes by task 3094 on cpu 1: [ 43.688023][ T3089] __d_rehash+0xc4/0x220 [ 43.692291][ T3089] __d_add+0x36d/0x4a0 [ 43.696392][ T3089] d_splice_alias+0xd6/0x270 [ 43.701009][ T3089] proc_sys_lookup+0x3a7/0x460 [ 43.705804][ T3089] path_openat+0xc4f/0x1d10 [ 43.710330][ T3089] do_filp_open+0xf6/0x200 [ 43.714757][ T3089] do_sys_openat2+0xab/0x110 [ 43.719369][ T3089] __x64_sys_openat+0xf3/0x120 [ 43.724161][ T3089] do_syscall_64+0x41/0xc0 [ 43.728604][ T3089] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.734528][ T3089] [ 43.736870][ T3089] read to 0xffff888102383f10 of 8 bytes by task 3089 on cpu 0: [ 43.744421][ T3089] retain_dentry+0x40/0x190 [ 43.748957][ T3089] dput+0x108/0x1f0 [ 43.752794][ T3089] __fput+0x46f/0x600 [ 43.756775][ T3089] ____fput+0x15/0x20 [ 43.760761][ T3089] task_work_run+0x135/0x1a0 [ 43.765358][ T3089] exit_to_user_mode_loop+0xd1/0xe0 [ 43.770570][ T3089] exit_to_user_mode_prepare+0x6c/0xb0 [ 43.776045][ T3089] syscall_exit_to_user_mode+0x26/0x140 [ 43.781604][ T3089] do_syscall_64+0x4d/0xc0 [ 43.786030][ T3089] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 43.791936][ T3089] [ 43.794260][ T3089] value changed: 0xffff888237850488 -> 0xffff888106354488 [ 43.801383][ T3089] [ 43.803721][ T3089] Reported by Kernel Concurrency Sanitizer on: [ 43.809868][ T3089] CPU: 0 PID: 3089 Comm: syz-executor.5 Not tainted 6.5.0-rc5-syzkaller-00021-ga027b2eca0b7 #0 [ 43.820199][ T3089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 43.830264][ T3089] ================================================================== [ 43.915013][ T3081] chnl_net:caif_netlink_parms(): no params data found [ 43.986852][ T3081] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.993994][ T3081] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.001229][ T3081] bridge_slave_0: entered allmulticast mode [ 44.007705][ T3081] bridge_slave_0: entered promiscuous mode [ 44.015412][ T3081] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.022506][ T3081] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.029714][ T3081] bridge_slave_1: entered allmulticast mode [ 44.035961][ T3081] bridge_slave_1: entered promiscuous mode [ 44.055689][ T3081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.080729][ T3081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.133397][ T3081] team0: Port device team_slave_0 added [ 44.147813][ T3081] team0: Port device team_slave_1 added [ 44.209428][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.216487][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.242486][ T3081] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.275562][ T3081] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.282559][ T3081] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.308599][ T3081] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 44.323664][ T3094] chnl_net:caif_netlink_parms(): no params data found [ 44.369811][ T3112] chnl_net:caif_netlink_parms(): no params data found [ 44.439202][ T3081] hsr_slave_0: entered promiscuous mode [ 44.445224][ T3081] hsr_slave_1: entered promiscuous mode [ 44.483008][ T3094] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.490092][ T3094] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.497206][ T3094] bridge_slave_0: entered allmulticast mode [ 44.503807][ T3094] bridge_slave_0: entered promiscuous mode [ 44.510917][ T3094] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.517981][ T3094] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.525080][ T3094] bridge_slave_1: entered allmulticast mode [ 44.532137][ T3094] bridge_slave_1: entered promiscuous mode [ 44.571112][ T3112] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.578302][ T3112] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.585399][ T3112] bridge_slave_0: entered allmulticast mode [ 44.592162][ T3112] bridge_slave_0: entered promiscuous mode [ 44.600540][ T3089] chnl_net:caif_netlink_parms(): no params data found [ 44.610194][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.623551][ T3103] chnl_net:caif_netlink_parms(): no params data found [ 44.632472][ T3112] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.639559][ T3112] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.646729][ T3112] bridge_slave_1: entered allmulticast mode [ 44.653974][ T3112] bridge_slave_1: entered promiscuous mode [ 44.663820][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.721850][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 44.735674][ T3094] team0: Port device team_slave_0 added [ 44.757560][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 44.771160][ T3094] team0: Port device team_slave_1 added [ 44.832498][ T3094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 44.839469][ T3094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.865439][ T3094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 44.876282][ T3089] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.883412][ T3089] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.890538][ T3089] bridge_slave_0: entered allmulticast mode [ 44.900467][ T3089] bridge_slave_0: entered promiscuous mode [ 44.906894][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.914111][ T3103] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.921279][ T3103] bridge_slave_0: entered allmulticast mode [ 44.927527][ T3103] bridge_slave_0: entered promiscuous mode [ 44.934567][ T3112] team0: Port device team_slave_0 added [ 44.943457][ T3112] team0: Port device team_slave_1 added [ 44.949315][ T3111] chnl_net:caif_netlink_parms(): no params data found [ 44.958324][ T3094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 44.965340][ T3094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 44.991361][ T3094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.002286][ T3089] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.009385][ T3089] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.016744][ T3089] bridge_slave_1: entered allmulticast mode [ 45.023301][ T3089] bridge_slave_1: entered promiscuous mode [ 45.029589][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.036707][ T3103] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.043953][ T3103] bridge_slave_1: entered allmulticast mode [ 45.050514][ T3103] bridge_slave_1: entered promiscuous mode [ 45.106541][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.120559][ T3112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.127587][ T3112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.153657][ T3112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.177699][ T3094] hsr_slave_0: entered promiscuous mode [ 45.183711][ T3094] hsr_slave_1: entered promiscuous mode [ 45.189721][ T3094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.197456][ T3094] Cannot create hsr debugfs directory [ 45.203945][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.214158][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.223513][ T3112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.230496][ T3112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.256463][ T3112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.325710][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.343591][ T3111] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.350796][ T3111] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.357897][ T3111] bridge_slave_0: entered allmulticast mode [ 45.365996][ T3111] bridge_slave_0: entered promiscuous mode [ 45.373403][ T3089] team0: Port device team_slave_0 added [ 45.387079][ T3089] team0: Port device team_slave_1 added [ 45.401587][ T3111] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.408768][ T3111] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.415889][ T3111] bridge_slave_1: entered allmulticast mode [ 45.423963][ T3111] bridge_slave_1: entered promiscuous mode [ 45.431886][ T3112] hsr_slave_0: entered promiscuous mode [ 45.437990][ T3112] hsr_slave_1: entered promiscuous mode [ 45.445205][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.452791][ T3112] Cannot create hsr debugfs directory [ 45.469201][ T3103] team0: Port device team_slave_0 added [ 45.480606][ T3081] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 45.494968][ T3103] team0: Port device team_slave_1 added [ 45.507610][ T3081] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 45.516584][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.523654][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.549608][ T3089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.568937][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.579082][ T3081] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 45.587386][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.594409][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.620437][ T3089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.644209][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.655459][ T3081] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 45.676439][ T3103] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.683509][ T3103] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.709451][ T3103] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.731370][ T3111] team0: Port device team_slave_0 added [ 45.742945][ T3089] hsr_slave_0: entered promiscuous mode [ 45.748954][ T3089] hsr_slave_1: entered promiscuous mode [ 45.754849][ T3089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.762581][ T3089] Cannot create hsr debugfs directory [ 45.768351][ T3103] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.775313][ T3103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.801228][ T3103] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.823417][ T3111] team0: Port device team_slave_1 added [ 45.859713][ T3111] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.866680][ T3111] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.892588][ T3111] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.915609][ T3111] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.922636][ T3111] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.948686][ T3111] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 45.961660][ T3103] hsr_slave_0: entered promiscuous mode [ 45.967615][ T3103] hsr_slave_1: entered promiscuous mode [ 45.973517][ T3103] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 45.981105][ T3103] Cannot create hsr debugfs directory [ 46.045472][ T3111] hsr_slave_0: entered promiscuous mode [ 46.051807][ T3111] hsr_slave_1: entered promiscuous mode [ 46.057772][ T3111] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.066079][ T26] kauditd_printk_skb: 12 callbacks suppressed [ 46.066090][ T26] audit: type=1400 audit(1691433086.583:103): avc: denied { remove_name } for pid=2751 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 46.066729][ T3111] Cannot create hsr debugfs directory [ 46.072227][ T26] audit: type=1400 audit(1691433086.583:104): avc: denied { rename } for pid=2751 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.102647][ T3081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.123143][ T26] audit: type=1400 audit(1691433086.583:105): avc: denied { create } for pid=2751 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 46.135220][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.199310][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.206381][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.215220][ T2733] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.222436][ T2733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.236425][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 46.249274][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 46.258403][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 46.268688][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 46.302863][ T3112] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 46.313160][ T3112] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 46.342183][ T3112] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 46.352389][ T3112] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 46.374595][ T3089] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 46.411062][ T3089] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 46.421167][ T3089] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 46.430446][ T3089] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 46.449422][ T3103] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 46.459539][ T3103] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 46.469412][ T3103] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 46.480416][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.502343][ T3103] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 46.514928][ T3094] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.527498][ T3081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.549971][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.562932][ T3111] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 46.584029][ T3187] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.591087][ T3187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.600651][ T3187] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.607708][ T3187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.619307][ T3111] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 46.629864][ T3111] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 46.640779][ T3112] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.655441][ T3187] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.662509][ T3187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.680061][ T3111] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 46.715043][ T3187] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.722184][ T3187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.779818][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.794496][ T3081] veth0_vlan: entered promiscuous mode [ 46.805819][ T3081] veth1_vlan: entered promiscuous mode [ 46.817642][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.844620][ T3089] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.862500][ T3103] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.872432][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.882886][ T3081] veth0_macvtap: entered promiscuous mode [ 46.891779][ T3081] veth1_macvtap: entered promiscuous mode [ 46.903873][ T3094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 46.923535][ T3111] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.932847][ T3188] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.939997][ T3188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.948988][ T3188] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.956044][ T3188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.965537][ T3188] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.972617][ T3188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.981767][ T3188] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.988820][ T3188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.013998][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.033953][ T3112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.063684][ T3081] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.073427][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.080521][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.091671][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.098737][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.137412][ T3081] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.146252][ T3081] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.155069][ T3081] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.163815][ T3081] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.196012][ T26] audit: type=1400 audit(1691433087.703:106): avc: denied { mounton } for pid=3081 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 47.240738][ T3103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.266827][ T3089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.295658][ T26] audit: type=1400 audit(1691433087.803:107): avc: denied { read write } for pid=3081 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 47.299876][ T3094] veth0_vlan: entered promiscuous mode 18:31:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.374698][ T3111] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.386469][ T26] audit: type=1400 audit(1691433087.833:108): avc: denied { open } for pid=3081 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 47.410878][ T26] audit: type=1400 audit(1691433087.833:109): avc: denied { ioctl } for pid=3081 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 47.436628][ T26] audit: type=1400 audit(1691433087.853:110): avc: denied { name_bind } for pid=3230 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 47.458222][ T26] audit: type=1400 audit(1691433087.853:111): avc: denied { node_bind } for pid=3230 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 47.478971][ T26] audit: type=1400 audit(1691433087.853:112): avc: denied { create } for pid=3230 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 47.502856][ T3094] veth1_vlan: entered promiscuous mode 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.542074][ T3112] veth0_vlan: entered promiscuous mode [ 47.556322][ T3094] veth0_macvtap: entered promiscuous mode [ 47.577175][ T3112] veth1_vlan: entered promiscuous mode [ 47.603337][ T3094] veth1_macvtap: entered promiscuous mode [ 47.623897][ T3111] veth0_vlan: entered promiscuous mode 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.645239][ T3094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.655821][ T3094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.673280][ T3094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.692779][ T3111] veth1_vlan: entered promiscuous mode 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.703008][ T3094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.713601][ T3094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.726011][ T3094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.734072][ T3112] veth0_macvtap: entered promiscuous mode [ 47.741929][ T3112] veth1_macvtap: entered promiscuous mode 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.764526][ T3094] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.773266][ T3094] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.782080][ T3094] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.790963][ T3094] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.808657][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.819165][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.829073][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.839702][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.853156][ T3112] batman_adv: batadv0: Interface activated: batadv_slave_0 18:31:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) [ 47.865351][ T3089] veth0_vlan: entered promiscuous mode [ 47.875879][ T3111] veth0_macvtap: entered promiscuous mode [ 47.894211][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.904737][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.914686][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.925169][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.938065][ T3112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.953205][ T3089] veth1_vlan: entered promiscuous mode [ 47.968011][ T3103] veth0_vlan: entered promiscuous mode [ 47.974839][ T3111] veth1_macvtap: entered promiscuous mode [ 47.995610][ T3112] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.004504][ T3112] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.013299][ T3112] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.022079][ T3112] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.036154][ T3103] veth1_vlan: entered promiscuous mode [ 48.055985][ T3089] veth0_macvtap: entered promiscuous mode [ 48.071117][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.081644][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.089415][ T3279] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 48.091514][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.111958][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.121809][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.132269][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.143499][ T3111] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.172363][ T3089] veth1_macvtap: entered promiscuous mode [ 48.180392][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.191030][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.200925][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.211591][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.221421][ T3111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.232014][ T3111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.243254][ T3111] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.253818][ T3103] veth0_macvtap: entered promiscuous mode [ 48.264165][ T3103] veth1_macvtap: entered promiscuous mode [ 48.280247][ T3111] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.289031][ T3111] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.297800][ T3111] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.306599][ T3111] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.325974][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.336558][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.346478][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.356989][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.366913][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.377387][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.387219][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.397824][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.411836][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.421555][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.432033][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.441874][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.452354][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.462213][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.472735][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.482591][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.493097][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.504170][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.526793][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.537454][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.547294][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.557761][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.567678][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.578304][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.588226][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.598742][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.608602][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 48.619077][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.630298][ T3103] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 48.640067][ T3089] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.648928][ T3089] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.657633][ T3089] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.666419][ T3089] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.689719][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.700227][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.710064][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.720518][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.730476][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.740930][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.750810][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.761281][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.771150][ T3103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 48.781637][ T3103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 48.793722][ T3103] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 48.804223][ T3103] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.813107][ T3103] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.821889][ T3103] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.830581][ T3103] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 18:31:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 18:31:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="58000000000703000000000000000000020000000c000340fffffffffffffff90c0003400000000000000fff0900010073"], 0x58}}, 0x0) [ 48.943819][ T3294] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 18:31:30 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:30 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f00000009c0)) 18:31:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="58000000000703000000000000000000020000000c000340fffffffffffffff90c0003400000000000000fff0900010073"], 0x58}}, 0x0) 18:31:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x2}, 0x1c) listen(r0, 0x1000) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100090c10000000000000000000", 0x58}], 0x1) 18:31:30 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:30 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f00000009c0)) 18:31:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:30 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="58000000000703000000000000000000020000000c000340fffffffffffffff90c0003400000000000000fff0900010073"], 0x58}}, 0x0) [ 49.736771][ T3310] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 18:31:30 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f00000009c0)) 18:31:30 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 49.783999][ T3320] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 18:31:31 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:31 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 51.507752][ T3346] syz-executor.5 (3346) used greatest stack depth: 11496 bytes left 18:31:32 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:33 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:33 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:33 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:33 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:33 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_ARPTABLES={0x5}, @IFLA_BR_NF_CALL_IP6TABLES={0x5, 0x25, 0x1}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) 18:31:33 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:33 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}}) 18:31:33 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0) 18:31:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x24}}, 0x0)