Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2020/06/18 12:17:27 fuzzer started 2020/06/18 12:17:27 dialing manager at 10.128.0.26:34675 2020/06/18 12:17:27 syscalls: 3089 2020/06/18 12:17:27 code coverage: enabled 2020/06/18 12:17:27 comparison tracing: enabled 2020/06/18 12:17:27 extra coverage: enabled 2020/06/18 12:17:27 setuid sandbox: enabled 2020/06/18 12:17:27 namespace sandbox: enabled 2020/06/18 12:17:27 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/18 12:17:27 fault injection: enabled 2020/06/18 12:17:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/18 12:17:27 net packet injection: enabled 2020/06/18 12:17:27 net device setup: enabled 2020/06/18 12:17:27 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/18 12:17:27 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/18 12:17:27 USB emulation: enabled 12:18:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syzkaller login: [ 132.796840][ T6819] IPVS: ftp: loaded support on port[0] = 21 12:18:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv4=@dccp={{0x5, 0x6, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x84, 0x0, @private, @dev}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00-\x00', 0x0, '\a\x00@'}, "ccbfc12abc282c27820fd911"}}}}, 0x3a) [ 132.946985][ T6819] chnl_net:caif_netlink_parms(): no params data found [ 133.052133][ T6819] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.077216][ T6819] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.092722][ T6819] device bridge_slave_0 entered promiscuous mode [ 133.113243][ T6949] IPVS: ftp: loaded support on port[0] = 21 [ 133.120690][ T6819] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.128089][ T6819] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.142368][ T6819] device bridge_slave_1 entered promiscuous mode 12:18:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x6c, 0x1, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_ID={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x57}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x27}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x4, 0x3ff, 0x5, 0x9, 0x3f, 0x8000, 0x40]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0xef12, 0x0]}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc0}, 0x8040) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000040), 0x8) poll(0x0, 0x0, 0x82) [ 133.199528][ T6819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.226382][ T6819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.309734][ T6819] team0: Port device team_slave_0 added [ 133.348109][ T6819] team0: Port device team_slave_1 added [ 133.369921][ T6949] chnl_net:caif_netlink_parms(): no params data found [ 133.392215][ T6819] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 133.399613][ T6819] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.425935][ T6819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 133.442208][ T6819] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 133.449371][ T6819] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.476076][ T6819] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 12:18:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044940eeba71a4976e252922cb18f04000000000000012e0b3836005404b0e0301a4ce875f2fcff5f0300000000000000800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5f6db1c00010000000000000049740000000000000006ad8e5ecc1f003a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c}}]}, 0x78}}, 0x0) [ 133.577397][ T6819] device hsr_slave_0 entered promiscuous mode [ 133.644437][ T6819] device hsr_slave_1 entered promiscuous mode [ 133.733614][ T7089] IPVS: ftp: loaded support on port[0] = 21 [ 133.861783][ T6949] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.870746][ T6949] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.879664][ T6949] device bridge_slave_0 entered promiscuous mode 12:18:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x1, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) [ 133.916826][ T6949] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.926483][ T6949] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.936585][ T6949] device bridge_slave_1 entered promiscuous mode [ 133.982970][ T6949] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.999326][ T7145] IPVS: ftp: loaded support on port[0] = 21 [ 134.037334][ T6949] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.169397][ T6949] team0: Port device team_slave_0 added [ 134.217325][ T6819] netdevsim netdevsim0 netdevsim0: renamed from eth0 12:18:46 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) [ 134.311496][ T6949] team0: Port device team_slave_1 added [ 134.331085][ T6819] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 134.409067][ T6819] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 134.477541][ T6819] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 134.529902][ T7089] chnl_net:caif_netlink_parms(): no params data found [ 134.553470][ T6949] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 134.562611][ T6949] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.590446][ T6949] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 134.604366][ T6949] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 134.608603][ T7289] IPVS: ftp: loaded support on port[0] = 21 [ 134.611322][ T6949] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.644509][ T6949] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 134.681156][ T7279] IPVS: ftp: loaded support on port[0] = 21 [ 134.786586][ T6949] device hsr_slave_0 entered promiscuous mode [ 134.835689][ T6949] device hsr_slave_1 entered promiscuous mode [ 134.873613][ T6949] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 134.881387][ T6949] Cannot create hsr debugfs directory [ 135.007171][ T7145] chnl_net:caif_netlink_parms(): no params data found [ 135.019089][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.026945][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.036528][ T7089] device bridge_slave_0 entered promiscuous mode [ 135.089008][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.098361][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.106864][ T7089] device bridge_slave_1 entered promiscuous mode [ 135.182733][ T7089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.214846][ T7289] chnl_net:caif_netlink_parms(): no params data found [ 135.238479][ T7089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.287064][ T7089] team0: Port device team_slave_0 added [ 135.340046][ T7089] team0: Port device team_slave_1 added [ 135.374106][ T7145] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.381166][ T7145] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.390675][ T7145] device bridge_slave_0 entered promiscuous mode [ 135.434134][ T7145] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.441190][ T7145] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.452036][ T7145] device bridge_slave_1 entered promiscuous mode [ 135.468325][ T7089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 135.476963][ T7089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 135.503583][ T7089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 135.520679][ T7089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 135.529412][ T7089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 135.555903][ T7089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 135.581139][ T7145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.592979][ T7289] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.601290][ T7289] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.610948][ T7289] device bridge_slave_0 entered promiscuous mode [ 135.622433][ T7289] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.629785][ T7289] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.637647][ T7289] device bridge_slave_1 entered promiscuous mode [ 135.661341][ T7145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.752427][ T7289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.787985][ T7089] device hsr_slave_0 entered promiscuous mode [ 135.834357][ T7089] device hsr_slave_1 entered promiscuous mode [ 135.883277][ T7089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 135.890979][ T7089] Cannot create hsr debugfs directory [ 135.904698][ T6819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.914166][ T7145] team0: Port device team_slave_0 added [ 135.928156][ T7289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.951142][ T6949] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 135.996547][ T7279] chnl_net:caif_netlink_parms(): no params data found [ 136.008252][ T7145] team0: Port device team_slave_1 added [ 136.030748][ T6949] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 136.090356][ T7289] team0: Port device team_slave_0 added [ 136.118644][ T6949] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 136.166795][ T7289] team0: Port device team_slave_1 added [ 136.172704][ T6949] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 136.220766][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.230478][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.241705][ T6819] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.249024][ T7145] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 136.257134][ T7145] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.284582][ T7145] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 136.336646][ T7145] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 136.344224][ T7145] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.371362][ T7145] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 136.389593][ T7289] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 136.401302][ T7289] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.428922][ T7289] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 136.441804][ T7289] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 136.449598][ T7289] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.476772][ T7289] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 136.507881][ T7279] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.515966][ T7279] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.525831][ T7279] device bridge_slave_0 entered promiscuous mode [ 136.543317][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.551981][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.561360][ T3613] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.568605][ T3613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.576803][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.586133][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.595050][ T3613] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.602171][ T3613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.609996][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.687392][ T7145] device hsr_slave_0 entered promiscuous mode [ 136.744728][ T7145] device hsr_slave_1 entered promiscuous mode [ 136.803016][ T7145] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 136.814422][ T7145] Cannot create hsr debugfs directory [ 136.820021][ T7279] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.829239][ T7279] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.837432][ T7279] device bridge_slave_1 entered promiscuous mode [ 136.845214][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.930477][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.942128][ T7279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.997672][ T7289] device hsr_slave_0 entered promiscuous mode [ 137.053953][ T7289] device hsr_slave_1 entered promiscuous mode [ 137.092988][ T7289] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 137.100573][ T7289] Cannot create hsr debugfs directory [ 137.148640][ T7279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 137.165267][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.174876][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.248233][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.256824][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.265785][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.274449][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.282706][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.291569][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.300409][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.351774][ T7279] team0: Port device team_slave_0 added [ 137.361964][ T7089] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 137.410164][ T6819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.428978][ T7279] team0: Port device team_slave_1 added [ 137.447339][ T7089] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 137.486253][ T7089] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 137.587968][ T7089] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 137.658282][ T7279] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 137.668667][ T7279] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.695571][ T7279] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 137.711551][ T7279] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.719158][ T7279] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.745665][ T7279] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 137.846342][ T7279] device hsr_slave_0 entered promiscuous mode [ 137.893292][ T7279] device hsr_slave_1 entered promiscuous mode [ 137.952715][ T7279] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 137.960273][ T7279] Cannot create hsr debugfs directory [ 138.032059][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 138.039587][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 138.053593][ T7145] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 138.086802][ T6819] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.107525][ T7145] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 138.168656][ T7145] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 138.214721][ T7145] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 138.262110][ T6949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.351775][ T7289] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 138.394937][ T7289] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 138.472305][ T6949] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.516162][ T7289] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 138.584052][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.591816][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.603371][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.611783][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.665130][ T7279] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 138.716982][ T7289] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 138.786920][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.798818][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.807994][ T2591] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.815069][ T2591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.822820][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.831230][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.839721][ T2591] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.846862][ T2591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.856257][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.871311][ T6819] device veth0_vlan entered promiscuous mode [ 138.883432][ T7279] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 138.933519][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.941712][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.951166][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.960161][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.985278][ T6819] device veth1_vlan entered promiscuous mode [ 138.998370][ T7279] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 139.071705][ T7089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.083444][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 139.096148][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.105749][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.114914][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.124016][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.133399][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.176782][ T7279] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 139.232937][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 139.241203][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.250048][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.259094][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.267754][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.276341][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.284466][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.292015][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.300741][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.311750][ T7089] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.339756][ T7145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.373783][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.386359][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.395105][ T3613] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.402118][ T3613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.414002][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.424484][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.434325][ T3613] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.441357][ T3613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.456408][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.465146][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.473894][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.500923][ T7145] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.518997][ T6819] device veth0_macvtap entered promiscuous mode [ 139.527455][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 139.537011][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.547129][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.555151][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.589354][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 139.597778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 139.609340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.618949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.630547][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.637644][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.645341][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.653998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.662785][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.669820][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.679314][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.692831][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.718190][ T6819] device veth1_macvtap entered promiscuous mode [ 139.737551][ T6949] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.745035][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.757893][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.767050][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.777184][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.786027][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.794968][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.804268][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.812986][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.821431][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.832283][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.840108][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.848437][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.857402][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.877204][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.885695][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.907082][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.919463][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.928236][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.937343][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.945694][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.954442][ T2578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.975812][ T7289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.984624][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.006699][ T7145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.035999][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.044134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.066453][ T6819] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 140.083469][ T7289] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.105881][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.115811][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.124806][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.133707][ T2591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.173240][ T7145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.184243][ T6819] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 140.202734][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.210141][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.222880][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.230227][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.241276][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.250585][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.265844][ T3613] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.272940][ T3613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.280873][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.289672][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.298144][ T3613] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.305232][ T3613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.313515][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.322070][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.335990][ T7089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.374627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.383227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.391239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.400421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.409540][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.420199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.429888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.438739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.447509][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.461048][ T7279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.469589][ T6949] device veth0_vlan entered promiscuous mode [ 140.495518][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.503383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.510987][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.520181][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.529499][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.538887][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.547483][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.567386][ T7279] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.589535][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.597585][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.606061][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.615605][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.628028][ T6949] device veth1_vlan entered promiscuous mode [ 140.645872][ T7289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.670168][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.679898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.689781][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.696925][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.707973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.716865][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.835658][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.843773][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.852634][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.860935][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.868019][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.887163][ T7145] device veth0_vlan entered promiscuous mode [ 141.001056][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.012785][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.021516][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.040230][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.096468][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.106602][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.114098][ T8073] x_tables: duplicate underflow at hook 2 [ 141.124958][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 141.137636][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:18:53 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00)=ANY=[], 0x260}, 0x4010000) socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1062}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00)=ANY=[], 0x260}, 0x4010000) socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1062}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00y.\xfc*_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7f\r\xb2\xcf\x8a\xc9(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0-\x96\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r0, 0x2}, 0x10) close(r3) [ 142.528286][ T6949] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.538250][ T6949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 142.548791][ T6949] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.560039][ T6949] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.572369][ T7089] device veth1_macvtap entered promiscuous mode [ 142.599030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.611046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.620992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.630191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.639282][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.664840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.685921][ T7289] device veth0_vlan entered promiscuous mode 12:18:55 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r0, 0x2}, 0x10) close(r3) [ 142.884127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.892862][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.919418][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 142.936644][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.946980][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 142.957772][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.975067][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 142.989292][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.001967][ T7089] batman_adv: batadv0: Interface activated: batadv_slave_0 12:18:55 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r0, 0x2}, 0x10) close(r3) [ 143.072751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.092233][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.107925][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.122261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.184550][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.219410][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.229375][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.240277][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.250211][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.260953][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.273947][ T7089] batman_adv: batadv0: Interface activated: batadv_slave_1 12:18:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="2e00000014008509000000000000002e020000e22c0000001600028000000c060000000000fe0000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 143.352895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.366086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.393379][ T7289] device veth1_vlan entered promiscuous mode [ 143.436372][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 143.447189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.462606][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.479336][ T7279] device veth0_vlan entered promiscuous mode [ 143.490663][ T8139] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 143.508113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.522592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 12:18:55 executing program 1: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x80079, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000c00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000680)) [ 143.603186][ T7289] device veth0_macvtap entered promiscuous mode [ 143.668654][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.682479][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.700475][ T7279] device veth1_vlan entered promiscuous mode [ 143.715043][ T7289] device veth1_macvtap entered promiscuous mode [ 143.746314][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 143.755737][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.774943][ T8147] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.798666][ T8149] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.956462][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.974189][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.987174][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.004632][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.017810][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.037104][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.047231][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.057968][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.070669][ T7289] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.097406][ T7279] device veth0_macvtap entered promiscuous mode [ 144.106072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.117150][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.126549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 144.135888][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.147579][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.158789][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.169216][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.181578][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.191819][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.202793][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.213134][ T7289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.223960][ T7289] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.235603][ T7289] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.244084][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 144.253702][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.263570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.276189][ T7279] device veth1_macvtap entered promiscuous mode [ 144.324143][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.335814][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.348560][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.359064][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.369194][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.379795][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.389921][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.400850][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.412713][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.423241][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.434763][ T7279] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.473846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.481878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.490352][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.502915][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.519692][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.530420][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.541673][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.551920][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.562405][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.572994][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.584243][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.594116][ T7279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.605162][ T7279] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.616486][ T7279] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.655153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.664318][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:18:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x6c, 0x1, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_ID={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x57}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x27}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x4, 0x3ff, 0x5, 0x9, 0x3f, 0x8000, 0x40]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0xef12, 0x0]}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc0}, 0x8040) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000040), 0x8) poll(0x0, 0x0, 0x82) 12:18:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="2e00000014008509000000000000002e020000e22c0000001600028000000c060000000000fe0000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 12:18:57 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000440)={0x0, 0x70, 0x1, 0x7f, 0x6, 0x40, 0x0, 0x1f, 0x10080, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x100, 0xe13d, 0x4250, 0x6, 0x3a, 0x1, 0x81}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)) 12:18:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0xf}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:18:57 executing program 1: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x80079, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000c00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000680)) 12:18:57 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x80, 0x22d80000]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x6, 0x29, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext, 0x1840, 0xfff, 0x8a, 0x0, 0x10000, 0xfff, 0x1}, r3, 0x1, 0xffffffffffffffff, 0xa) [ 144.915018][ T8167] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 12:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r3, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) [ 145.036693][ T8180] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 12:18:57 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x80, 0x22d80000]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x6, 0x29, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext, 0x1840, 0xfff, 0x8a, 0x0, 0x10000, 0xfff, 0x1}, r3, 0x1, 0xffffffffffffffff, 0xa) 12:18:57 executing program 1: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x80079, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000c00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000680)) [ 145.108742][ T8184] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 145.144908][ T8184] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 145.160661][ T8184] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 12:18:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000440)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) 12:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) 12:18:57 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$kcm(0xa, 0x2, 0x73) [ 145.330518][ T8198] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 145.480384][ T8210] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 145.492118][ T8210] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 145.500525][ T8210] CPU: 1 PID: 8210 Comm: syz-executor.4 Not tainted 5.7.0-rc7-next-20200529-syzkaller #0 [ 145.510317][ T8210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.520381][ T8210] RIP: 0010:inet_unhash+0x11f/0x750 [ 145.525568][ T8210] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 145.545163][ T8210] RSP: 0018:ffffc900019efd38 EFLAGS: 00010202 [ 145.551214][ T8210] RAX: dffffc0000000000 RBX: ffff88805cf8f480 RCX: ffffc90011f46000 [ 145.559175][ T8210] RDX: 0000000000000001 RSI: ffffffff86a22451 RDI: 0000000000000008 [ 145.567137][ T8210] RBP: 0000000000000000 R08: ffff88805c90e080 R09: ffffed100b9f1f52 [ 145.575097][ T8210] R10: ffff88805cf8fa8f R11: ffffed100b9f1f51 R12: ffff88805cf8f4f0 [ 145.583057][ T8210] R13: 0000000000000000 R14: ffff88805cf8f480 R15: 0000000000000073 [ 145.591020][ T8210] FS: 00007f04e760e700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 145.599933][ T8210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 145.606520][ T8210] CR2: 000000000073db94 CR3: 000000009df44000 CR4: 00000000001406e0 [ 145.614485][ T8210] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 145.622439][ T8210] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 145.630393][ T8210] Call Trace: [ 145.633674][ T8210] ? l2tp_ip6_getname+0x700/0x700 [ 145.638686][ T8210] sk_common_release+0xba/0x370 [ 145.643530][ T8210] inet6_create+0xd4a/0xf90 [ 145.648035][ T8210] __sock_create+0x3ca/0x730 [ 145.652618][ T8210] __sys_socket+0xef/0x200 [ 145.657138][ T8210] ? move_addr_to_kernel+0x70/0x70 [ 145.662239][ T8210] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 145.667773][ T8210] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 145.673742][ T8210] __x64_sys_socket+0x6f/0xb0 [ 145.678462][ T8210] do_syscall_64+0x60/0xe0 [ 145.682873][ T8210] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.688751][ T8210] RIP: 0033:0x45ca59 [ 145.692650][ T8210] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.712237][ T8210] RSP: 002b:00007f04e760dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 145.720635][ T8210] RAX: ffffffffffffffda RBX: 0000000000507ea0 RCX: 000000000045ca59 12:18:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x6c, 0x1, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_ID={0x8}, @CTA_SEQ_ADJ_ORIG={0x1c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x57}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x27}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}]}, @CTA_LABELS_MASK={0x20, 0x17, [0x4, 0x3ff, 0x5, 0x9, 0x3f, 0x8000, 0x40]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0xef12, 0x0]}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc0}, 0x8040) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000040), 0x8) poll(0x0, 0x0, 0x82) 12:18:58 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @rand_addr=0x622f0000}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x80, 0x0]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x6, 0x29, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x3}, 0x1840, 0xfff, 0x8a, 0x0, 0x10000, 0x0, 0x1}, r3, 0x1, 0xffffffffffffffff, 0xa) 12:18:58 executing program 1: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x80079, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc09000c00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000680)) 12:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) 12:18:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) [ 145.728600][ T8210] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 145.736561][ T8210] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 145.744536][ T8210] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 145.752493][ T8210] R13: 0000000000000bb1 R14: 00000000004ce101 R15: 00007f04e760e6d4 [ 145.760450][ T8210] Modules linked in: [ 145.840405][ T8223] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 12:18:58 executing program 1: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r1 = socket(0x11, 0x800000003, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f00000001c0)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) keyctl$describe(0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 12:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) 12:18:58 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @rand_addr=0x622f0000}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x80, 0x0]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x6, 0x29, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x3}, 0x1840, 0xfff, 0x8a, 0x0, 0x10000, 0x0, 0x1}, r3, 0x1, 0xffffffffffffffff, 0xa) 12:18:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000000800000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26bb6b0cea54794e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6d8477b9ea9a499ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835d9f213e7ff0b00001731859eba975d4a1809acbc7b716441efc766be4825548e085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f0000000002ffa95acb51428785ae09fdae241f51f7ff22745696f1ffe2ca9ed226213275a566ae3f64fb2dfe777d1683f0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b711f4b6746dce6ec1ce348570863eb8cb9e83d2e2d5241435b5ddc91e9e99ad6b9cbe55e294f5b1e5dc8f1c7bdd3cf375c0b30ce6ba07ce35f90f0c589bc98d678d7e258d5d74a133278866780ddac5fe771e6ae67da6e2df4a560436fa3cb7598f923c7316bb7c31f8e867734a5a66f0469fa87f64cd637deb88254e9ded8cb00c1276b1aaffb3cf86fb92efc51802cdd76a73fd639edea01662abbc567a9db53997aa9abd409b5cb990ea1bc76127057ad3ae00000000000000000000444e477613181b1c6fb1f9c3cb0f5b0a187994d25c55dd04442f2f739ce0b3e4377f3d9887cdf898a4463717a1cf4c5d83e93d581b815950e21279f8bcb5167247a398754a1493639f275c5d6c6ea752b63551125eda435ba90cae00e1383f43a77508c2cd9fb2636db3abed6453179e3ca03bd3a3dbc4b61dbbfce11ce2d9dbeb6844a88348197292379d22fb6ea97a4f734953d3697cad93d588172c99700fc4f2983edf5d8bb2ec6dc0cc319881b43b7a8a1d1f872d0000000000ddad9444a6f712c20fd0d908c376316a7b26cbaad28bc703c9492f01de1f5d2093213aa1354e783b15f627834d840c6738f8b16b80cc0b0582a3aa02553979e47bdf3716228c4ff4676997286042b43c6cb7e2a01a16ae5757072574afadf6962a40ed57025b5a3897db7f94e8d5ba14fd018c5b302942916cf7314e3c9a00a378771ee3c704a3947879f4ea1f031cd8432a27bc2c1a06fb3145bc33c47259ae1f"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) 12:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000000800000027000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c40c5f89f8b5c13a24800a26bb6b0cea54794e702d609331ab3c70aa6b030ed69efddccea3e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6d8477b9ea9a499ef6943a143669ef5fc545ab7ffef72fd2ca305f386142d7835d9f213e7ff0b00001731859eba975d4a1809acbc7b716441efc766be4825548e085c7866d7ac33165a2178a5c647457a8713e7b70a85bbdb078320eafa48d43c96aebc3da20d188f590ec28e549e8e3d4fe60c9fea00000000000100019efc0060c9e1263ca5507f0000000002ffa95acb51428785ae09fdae241f51f7ff22745696f1ffe2ca9ed226213275a566ae3f64fb2dfe777d1683f0fe11894d2c876e4809a16ce03ba31d2e344151341d1008ae03265f8f99ae15d9b711f4b6746dce6ec1ce348570863eb8cb9e83d2e2d5241435b5ddc91e9e99ad6b9cbe55e294f5b1e5dc8f1c7bdd3cf375c0b30ce6ba07ce35f90f0c589bc98d678d7e258d5d74a133278866780ddac5fe771e6ae67da6e2df4a560436fa3cb7598f923c7316bb7c31f8e867734a5a66f0469fa87f64cd637deb88254e9ded8cb00c1276b1aaffb3cf86fb92efc51802cdd76a73fd639edea01662abbc567a9db53997aa9abd409b5cb990ea1bc76127057ad3ae00000000000000000000444e477613181b1c6fb1f9c3cb0f5b0a187994d25c55dd04442f2f739ce0b3e4377f3d9887cdf898a4463717a1cf4c5d83e93d581b815950e21279f8bcb5167247a398754a1493639f275c5d6c6ea752b63551125eda435ba90cae00e1383f43a77508c2cd9fb2636db3abed6453179e3ca03bd3a3dbc4b61dbbfce11ce2d9dbeb6844a88348197292379d22fb6ea97a4f734953d3697cad93d588172c99700fc4f2983edf5d8bb2ec6dc0cc319881b43b7a8a1d1f872d0000000000ddad9444a6f712c20fd0d908c376316a7b26cbaad28bc703c9492f01de1f5d2093213aa1354e783b15f627834d840c6738f8b16b80cc0b0582a3aa02553979e47bdf3716228c4ff4676997286042b43c6cb7e2a01a16ae5757072574afadf6962a40ed57025b5a3897db7f94e8d5ba14fd018c5b302942916cf7314e3c9a00a378771ee3c704a3947879f4ea1f031cd8432a27bc2c1a06fb3145bc33c47259ae1f"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), &(0x7f0000000680), 0x721, r0}, 0x38) 12:18:58 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000000, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @rand_addr=0x622f0000}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x80, 0x0]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x6, 0x29, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x3}, 0x1840, 0xfff, 0x8a, 0x0, 0x10000, 0x0, 0x1}, r3, 0x1, 0xffffffffffffffff, 0xa) [ 146.228943][ T8210] ---[ end trace 82538aff3ec62cd2 ]--- [ 146.254320][ T8210] RIP: 0010:inet_unhash+0x11f/0x750 [ 146.283492][ T8210] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 146.320475][ T8245] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#2] PREEMPT SMP KASAN [ 146.332199][ T8245] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 146.340608][ T8245] CPU: 0 PID: 8245 Comm: syz-executor.4 Tainted: G D 5.7.0-rc7-next-20200529-syzkaller #0 [ 146.351781][ T8245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.361831][ T8245] RIP: 0010:inet_unhash+0x11f/0x750 [ 146.367016][ T8245] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 146.386608][ T8245] RSP: 0018:ffffc90001877d38 EFLAGS: 00010202 [ 146.392673][ T8245] RAX: dffffc0000000000 RBX: ffff88805acf74c0 RCX: ffffc90012147000 [ 146.399873][ T8210] RSP: 0018:ffffc900019efd38 EFLAGS: 00010202 [ 146.400655][ T8245] RDX: 0000000000000001 RSI: ffffffff86a22451 RDI: 0000000000000008 [ 146.400662][ T8245] RBP: 0000000000000000 R08: ffff8880a88d82c0 R09: ffffed100b59ef5a [ 146.400669][ T8245] R10: ffff88805acf7acf R11: ffffed100b59ef59 R12: ffff88805acf7530 [ 146.400676][ T8245] R13: 0000000000000000 R14: ffff88805acf74c0 R15: 0000000000000073 [ 146.400685][ T8245] FS: 00007f04e75ed700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 146.400697][ T8245] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.434351][ T8210] RAX: dffffc0000000000 RBX: ffff88805cf8f480 RCX: ffffc90011f46000 [ 146.438541][ T8245] CR2: 00007f04e75cbdb8 CR3: 000000009df44000 CR4: 00000000001406f0 [ 146.438552][ T8245] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 146.438559][ T8245] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 146.438570][ T8245] Call Trace: [ 146.490084][ T8245] ? l2tp_ip6_getname+0x700/0x700 [ 146.495105][ T8245] sk_common_release+0xba/0x370 [ 146.499946][ T8245] inet6_create+0xd4a/0xf90 [ 146.500379][ T8210] RDX: 0000000000000001 RSI: ffffffff86a22451 RDI: 0000000000000008 [ 146.504455][ T8245] __sock_create+0x3ca/0x730 [ 146.504471][ T8245] __sys_socket+0xef/0x200 [ 146.504484][ T8245] ? move_addr_to_kernel+0x70/0x70 [ 146.504496][ T8245] ? __x64_sys_clock_gettime+0x165/0x240 [ 146.504512][ T8245] ? check_preemption_disabled+0x38/0x220 [ 146.527573][ T8210] RBP: 0000000000000000 R08: ffff88805c90e080 R09: ffffed100b9f1f52 [ 146.532103][ T8245] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 146.532118][ T8245] __x64_sys_socket+0x6f/0xb0 [ 146.532130][ T8245] do_syscall_64+0x60/0xe0 [ 146.532142][ T8245] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.532154][ T8245] RIP: 0033:0x45ca59 [ 146.553873][ T8210] R10: ffff88805cf8fa8f R11: ffffed100b9f1f51 R12: ffff88805cf8f4f0 [ 146.556494][ T8245] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.556500][ T8245] RSP: 002b:00007f04e75ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 146.556511][ T8245] RAX: ffffffffffffffda RBX: 0000000000507ea0 RCX: 000000000045ca59 [ 146.556522][ T8245] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 000000000000000a [ 146.574947][ T8210] R13: 0000000000000000 R14: ffff88805cf8f480 R15: 0000000000000073 [ 146.578579][ T8245] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 146.578587][ T8245] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 146.578595][ T8245] R13: 0000000000000bb1 R14: 00000000004ce101 R15: 00007f04e75ed6d4 [ 146.578613][ T8245] Modules linked in: [ 146.623855][ T8210] FS: 00007f04e760e700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 146.755530][ T8210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 146.820173][ T8210] CR2: 00007f14bc252000 CR3: 000000009df44000 CR4: 00000000001406e0 [ 146.887757][ T8245] ---[ end trace 82538aff3ec62cd3 ]--- [ 146.896397][ T8245] RIP: 0010:inet_unhash+0x11f/0x750 [ 146.902641][ T8210] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 146.914079][ T8245] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 146.918519][ T8210] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 146.957907][ T8245] RSP: 0018:ffffc900019efd38 EFLAGS: 00010202 [ 146.958691][ T8210] Kernel panic - not syncing: Fatal exception [ 146.971504][ T8210] Kernel Offset: disabled [ 146.975818][ T8210] Rebooting in 86400 seconds..