[ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. [ 49.162881][ T4921] systemd-udevd (4921) used greatest stack depth: 21584 bytes left [ 49.196052][ T4839] systemd-udevd (4839) used greatest stack depth: 21312 bytes left Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. 2020/05/31 12:41:28 fuzzer started 2020/05/31 12:41:28 dialing manager at 10.128.0.26:45895 2020/05/31 12:41:29 syscalls: 3055 2020/05/31 12:41:29 code coverage: enabled 2020/05/31 12:41:29 comparison tracing: enabled 2020/05/31 12:41:29 extra coverage: enabled 2020/05/31 12:41:29 setuid sandbox: enabled 2020/05/31 12:41:29 namespace sandbox: enabled 2020/05/31 12:41:29 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/31 12:41:29 fault injection: enabled 2020/05/31 12:41:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/31 12:41:29 net packet injection: enabled 2020/05/31 12:41:29 net device setup: enabled 2020/05/31 12:41:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/31 12:41:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/31 12:41:29 USB emulation: enabled 12:42:36 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0x0) write$binfmt_script(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c653020f0"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syzkaller login: [ 124.625445][ T6879] IPVS: ftp: loaded support on port[0] = 21 12:42:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) creat(&(0x7f00000001c0)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x202201, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x89ec, &(0x7f0000000280)) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) r2 = io_uring_setup(0x767, &(0x7f0000000100)) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x4c9f1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) io_submit(r1, 0x9001, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 124.778913][ T6879] chnl_net:caif_netlink_parms(): no params data found [ 124.882118][ T6879] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.904675][ T6879] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.912889][ T6879] device bridge_slave_0 entered promiscuous mode [ 124.938807][ T6879] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.954755][ T6879] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.962897][ T6879] device bridge_slave_1 entered promiscuous mode [ 124.991302][ T7009] IPVS: ftp: loaded support on port[0] = 21 12:42:37 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@pkttype={{0x28, 'pkttype\x00'}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'ipvlan1\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) [ 125.042108][ T6879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 125.067514][ T6879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 125.121676][ T6879] team0: Port device team_slave_0 added [ 125.141300][ T6879] team0: Port device team_slave_1 added [ 125.210576][ T6879] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 125.227401][ T6879] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.284844][ T6879] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 125.331746][ T7096] IPVS: ftp: loaded support on port[0] = 21 [ 125.339050][ T6879] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.347793][ T6879] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.381555][ T6879] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 125.411929][ T7009] chnl_net:caif_netlink_parms(): no params data found 12:42:37 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000044) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x202201, 0x0) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000280)) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) r3 = io_uring_setup(0x767, &(0x7f0000000100)) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x11, r3, 0x4c9f1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) io_submit(r2, 0x9001, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 125.522376][ T6879] device hsr_slave_0 entered promiscuous mode [ 125.587425][ T6879] device hsr_slave_1 entered promiscuous mode 12:42:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x8}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xb43e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000000200)}, 0x9138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x110, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="230228efb4a24fe84689000080cb000000005d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e64880800000000000000bf08002a74e3e6236e1882c601f2b49e32098f6919c7234cebfe065d74f205005de2be4e7b3881c92986a5aba82763b2d6419456919656cfba8227afd19e8f003e80efbe0b10d442ddd904000000000000004b03cc60656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721fec6933bef175b6d"], 0x157) dup(0xffffffffffffffff) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 125.730928][ T7167] IPVS: ftp: loaded support on port[0] = 21 [ 125.912114][ T7009] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.924788][ T7009] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.932823][ T7009] device bridge_slave_0 entered promiscuous mode [ 125.984688][ T7009] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.991847][ T7009] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.018010][ T7009] device bridge_slave_1 entered promiscuous mode [ 126.046299][ T7096] chnl_net:caif_netlink_parms(): no params data found [ 126.149376][ T7315] IPVS: ftp: loaded support on port[0] = 21 [ 126.172280][ T7009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.224299][ T7009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.263197][ T6879] netdevsim netdevsim0 netdevsim0: renamed from eth0 12:42:38 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x48, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000240)={0x5, 0x0, 0x0, 0x0, "85d9171b3d6d307550e9b1a75af222390367cc7a6b0d4dea841475350aca8504"}) [ 126.357229][ T6879] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 126.406539][ T7009] team0: Port device team_slave_0 added [ 126.425063][ T6879] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 126.502473][ T7009] team0: Port device team_slave_1 added [ 126.516702][ T6879] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 126.562237][ T7395] IPVS: ftp: loaded support on port[0] = 21 [ 126.637639][ T7096] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.646212][ T7096] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.653736][ T7096] device bridge_slave_0 entered promiscuous mode [ 126.666779][ T7009] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.673746][ T7009] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.700578][ T7009] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.713410][ T7009] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 126.720886][ T7009] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.747379][ T7009] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.761950][ T7096] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.770919][ T7096] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.781168][ T7096] device bridge_slave_1 entered promiscuous mode [ 126.798011][ T7167] chnl_net:caif_netlink_parms(): no params data found [ 126.850571][ T7096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.862717][ T7096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.968349][ T7009] device hsr_slave_0 entered promiscuous mode [ 127.015340][ T7009] device hsr_slave_1 entered promiscuous mode [ 127.054710][ T7009] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 127.062387][ T7009] Cannot create hsr debugfs directory [ 127.118667][ T7096] team0: Port device team_slave_0 added [ 127.139762][ T7096] team0: Port device team_slave_1 added [ 127.160671][ T7167] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.168979][ T7167] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.178471][ T7167] device bridge_slave_0 entered promiscuous mode [ 127.192855][ T7167] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.200378][ T7167] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.211262][ T7167] device bridge_slave_1 entered promiscuous mode [ 127.300879][ T7096] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.311908][ T7096] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.340068][ T7096] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 127.377961][ T7315] chnl_net:caif_netlink_parms(): no params data found [ 127.389975][ T7167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.399887][ T7096] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 127.407480][ T7096] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.433914][ T7096] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 127.478227][ T7167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.542148][ T7167] team0: Port device team_slave_0 added [ 127.594442][ T7395] chnl_net:caif_netlink_parms(): no params data found [ 127.608432][ T7167] team0: Port device team_slave_1 added [ 127.691716][ T7096] device hsr_slave_0 entered promiscuous mode [ 127.755276][ T7096] device hsr_slave_1 entered promiscuous mode [ 127.804700][ T7096] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 127.812229][ T7096] Cannot create hsr debugfs directory [ 127.925399][ T7167] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 127.932336][ T7167] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 127.961872][ T7167] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.000973][ T7009] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 128.040576][ T7167] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.051163][ T7167] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.078223][ T7167] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.107301][ T7315] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.114355][ T7315] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.123049][ T7315] device bridge_slave_0 entered promiscuous mode [ 128.134154][ T7315] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.142028][ T7315] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.150875][ T7315] device bridge_slave_1 entered promiscuous mode [ 128.159585][ T7009] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 128.216647][ T7009] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 128.270719][ T7009] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 128.417166][ T7167] device hsr_slave_0 entered promiscuous mode [ 128.465207][ T7167] device hsr_slave_1 entered promiscuous mode [ 128.524897][ T7167] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.532454][ T7167] Cannot create hsr debugfs directory [ 128.543263][ T7395] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.550646][ T7395] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.560189][ T7395] device bridge_slave_0 entered promiscuous mode [ 128.574742][ T7395] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.581934][ T7395] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.590328][ T7395] device bridge_slave_1 entered promiscuous mode [ 128.612137][ T6879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.642435][ T7315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.668713][ T7395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.683722][ T7395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.701330][ T7315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.769597][ T7395] team0: Port device team_slave_0 added [ 128.791106][ T7315] team0: Port device team_slave_0 added [ 128.809468][ T7395] team0: Port device team_slave_1 added [ 128.832693][ T7315] team0: Port device team_slave_1 added [ 128.893035][ T6879] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.912423][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.921969][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.951275][ T7315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.959467][ T7315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.987084][ T7315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.000369][ T7315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.008372][ T7315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.040468][ T7315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.052089][ T7395] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.059227][ T7395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.086199][ T7395] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.120803][ T7395] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.128480][ T7395] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.155371][ T7395] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.167440][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.177035][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.186340][ T2766] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.193491][ T2766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.215335][ T7096] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 129.317294][ T7315] device hsr_slave_0 entered promiscuous mode [ 129.346515][ T7315] device hsr_slave_1 entered promiscuous mode [ 129.404811][ T7315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 129.412341][ T7315] Cannot create hsr debugfs directory [ 129.421532][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 129.430357][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.439377][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.448157][ T2766] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.455327][ T2766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.470291][ T7096] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 129.516695][ T7096] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 129.566726][ T7096] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 129.692304][ T7167] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 129.743632][ T7167] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 129.798878][ T7167] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 129.898310][ T7395] device hsr_slave_0 entered promiscuous mode [ 129.955168][ T7395] device hsr_slave_1 entered promiscuous mode [ 130.015543][ T7395] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.023094][ T7395] Cannot create hsr debugfs directory [ 130.029896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.058122][ T7167] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 130.171357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.212843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.228925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.238577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.249797][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.276180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.292098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.303484][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.343369][ T6879] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.355983][ T6879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.387143][ T7009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 130.398118][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.406419][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.482438][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.492447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.530812][ T7009] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.587329][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.599930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.608524][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.615722][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.623884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.633286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.641713][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.648822][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.675567][ T7315] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 130.718889][ T7315] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 130.766237][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.774212][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 130.782170][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 130.789727][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.840632][ T7315] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 130.897448][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.927117][ T7395] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 130.967293][ T7315] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 131.022278][ T7096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.031715][ T6879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.047921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.057046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 131.066204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 131.075793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 131.084165][ T7395] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 131.158976][ T7395] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 131.226593][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 131.243657][ T7167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.254250][ T7395] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 131.345714][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.353814][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.362225][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.371073][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.401726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.411204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.426742][ T7096] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.451027][ T7009] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 131.463477][ T7009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 131.487014][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.499666][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.508382][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.516627][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.524200][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.533572][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.542378][ T27] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.549542][ T27] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.580095][ T6879] device veth0_vlan entered promiscuous mode [ 131.592448][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.601363][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.609947][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.619621][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 131.627668][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 131.635153][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.643734][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.652587][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.659824][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.668076][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.676389][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.714123][ T6879] device veth1_vlan entered promiscuous mode [ 131.728614][ T7167] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.755787][ T7009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 131.786506][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 131.800225][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 131.808139][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.818601][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.827642][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.836984][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.846215][ T2474] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.853249][ T2474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.861493][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.870787][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.879573][ T2474] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.886731][ T2474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.899667][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.930169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.970651][ T6879] device veth0_macvtap entered promiscuous mode [ 131.987271][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 131.996497][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.004932][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.013706][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.025487][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.034088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.042995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.051745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.061437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.070457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.079849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.091413][ T7096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.123730][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.131733][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 132.141226][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.153008][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.170698][ T7315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.185867][ T6879] device veth1_macvtap entered promiscuous mode [ 132.200935][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.210089][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.222320][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.232882][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.244757][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.253171][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.286932][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.294391][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.305217][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.313485][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.333368][ T7096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.354306][ T7167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.369155][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.384308][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.393299][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.401760][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.409887][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.422033][ T7009] device veth0_vlan entered promiscuous mode [ 132.439631][ T7009] device veth1_vlan entered promiscuous mode [ 132.451604][ T7395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.469066][ T7315] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.476188][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.492193][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.500579][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 132.542873][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.555784][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.563433][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 132.572083][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.581041][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.590483][ T2474] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.597705][ T2474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.617905][ T7167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.633140][ T6879] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.649430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.658835][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 132.666873][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 132.674391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.683701][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.693527][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.700666][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.711161][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.720747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.743813][ T7395] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.760941][ T6879] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.771855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.782228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.791452][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.799644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.807877][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.816801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.855228][ T7009] device veth0_macvtap entered promiscuous mode [ 132.869034][ T7009] device veth1_macvtap entered promiscuous mode [ 132.887021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.900572][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.909760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.922019][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.929144][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.937656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.946591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.955186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.963133][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.000264][ T7009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 133.011350][ T7009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.026193][ T7009] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 133.034930][ T7096] device veth0_vlan entered promiscuous mode [ 133.046576][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.054452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 133.063766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.072305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.081514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.092499][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.101948][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.110699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.119422][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.126566][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.133991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.142732][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.151974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.160630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.188677][ T7009] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 133.203265][ T7009] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 133.215929][ T7009] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 133.247871][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.257113][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.267411][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.276504][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.285249][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.293854][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.303314][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.316909][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.326856][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.336780][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.346074][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.361714][ T7096] device veth1_vlan entered promiscuous mode [ 133.394980][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.402782][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.416147][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.424879][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.433591][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.449709][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.458278][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.480401][ T7167] device veth0_vlan entered promiscuous mode [ 133.593235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.605795][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.631315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 12:42:45 executing program 0: add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)=""/184, 0xb8}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9419552f7d95716, @perf_config_ext={0x9, 0x77a4}, 0x0, 0x4, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f00000002c0)={0x0, 0x0}) pipe(0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f00000002c0)={0x0, &(0x7f0000000240)=""/47}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f00000001c0)={0x200000aa, &(0x7f0000000140)}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)=ANY=[@ANYRES16, @ANYRESDEC, @ANYRESOCT=0x0, @ANYBLOB="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", @ANYBLOB="a05985f62e38c00428bd6172c93d5554bccbf666f91e0922bc27dc699187dbc0cfd06a48b344e5abd19a", @ANYRESOCT=r3], 0x6, 0x0) clone(0x49221503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 133.655915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.664248][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.674332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.691340][ T7315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.747887][ T7167] device veth1_vlan entered promiscuous mode [ 133.758234][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 133.775324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.789857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.818848][ T7395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.846279][ T8144] IPVS: ftp: loaded support on port[0] = 21 [ 134.266278][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 134.277979][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.288973][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.293844][ C1] hrtimer: interrupt took 37262 ns [ 134.299581][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.320501][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.338281][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.357600][ T8119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.367784][ T7167] device veth0_macvtap entered promiscuous mode [ 134.379044][ T3533] tipc: TX() has been purged, node left! [ 134.381915][ T7096] device veth0_macvtap entered promiscuous mode [ 134.398149][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.408574][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.423193][ T7167] device veth1_macvtap entered promiscuous mode [ 134.445577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.454189][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.482989][ T7096] device veth1_macvtap entered promiscuous mode [ 134.496971][ T7395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.513188][ T7315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.561235][ T7167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.580552][ T7167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.599799][ T7167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 12:42:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xa808) 12:42:46 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x2) write(r0, &(0x7f0000000080)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="2c0000000300000000000000810000002d000200000000000000070000000000000000000100000000000000203b9d5a053786ed0fe77c91"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) [ 134.611433][ T7167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.626792][ T7167] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 134.676546][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.705413][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.737027][ T7167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.755163][ T7167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.777460][ T7167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 134.802669][ T7167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.840366][ T7167] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 134.868175][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.892784][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.929450][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 134.969139][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 134.991731][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.013251][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 12:42:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000200)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) [ 135.058519][ T7096] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.099629][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.124144][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.151333][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.173564][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.196073][ T8208] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 12:42:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 135.278031][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.309935][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.339309][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.363086][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.385619][ T7096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.409735][ T7096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.432790][ T7096] batman_adv: batadv0: Interface activated: batadv_slave_1 12:42:47 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 135.461303][ T8208] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 12:42:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@local, @empty, @val={@val={0x8100}}, {@ipv6}}, 0x0) [ 135.573057][ T28] audit: type=1800 audit(1590928967.718:2): pid=8218 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file0" dev="sda1" ino=15749 res=0 [ 135.866588][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.882096][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.891391][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.900670][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.915523][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.924325][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.981141][ T8208] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 136.008126][ T8228] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 12:42:48 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 136.394908][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.403247][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.495048][ T7315] device veth0_vlan entered promiscuous mode [ 136.515135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.536357][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.582799][ T7395] device veth0_vlan entered promiscuous mode [ 136.614562][ T7315] device veth1_vlan entered promiscuous mode [ 136.656210][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 136.664390][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.694035][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.707423][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.715860][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.730689][ T7395] device veth1_vlan entered promiscuous mode 12:42:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x5452, &(0x7f0000000200)={0x0, 'veth0\x00'}) [ 136.755716][ T8253] xt_time: unknown flags 0x4 12:42:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000044) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x202201, 0x0) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000280)) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) r3 = io_uring_setup(0x767, &(0x7f0000000100)) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x11, r3, 0x4c9f1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) io_submit(r2, 0x9001, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 136.810733][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 136.820536][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 136.829778][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 136.846619][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.865273][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.890284][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.908243][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.941105][ T7315] device veth0_macvtap entered promiscuous mode [ 136.971703][ T7395] device veth0_macvtap entered promiscuous mode [ 137.036065][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 137.044411][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 137.098828][ T7315] device veth1_macvtap entered promiscuous mode [ 137.120684][ T7395] device veth1_macvtap entered promiscuous mode [ 137.207875][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.226909][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.240960][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.253876][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.273389][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.283913][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.300815][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.311419][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.331416][ T7315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 137.367681][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.398908][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.418990][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.444762][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.464659][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.484677][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.494498][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.534598][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.544393][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.575560][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.587182][ T7395] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 137.594461][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.603861][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.613354][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.623906][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.646357][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.670641][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.689206][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.702190][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.718542][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.731890][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.752012][ T7315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.769685][ T7315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.782698][ T7315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 137.808042][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.835896][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.854670][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.865453][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.883235][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.893986][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.916439][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.935115][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.952454][ T7395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.964473][ T7395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.986588][ T7395] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 137.993900][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.003338][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.013556][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.022838][ T2474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:42:50 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x5452, &(0x7f0000000000)) 12:42:50 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x61) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x41}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15, 0x61}, 0xfe4f) 12:42:50 executing program 1: unshare(0x400) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) nanosleep(&(0x7f0000000040)={0x77359400}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 12:42:50 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000044) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x202201, 0x0) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000280)) io_setup(0x100000000000c333, &(0x7f0000000200)=0x0) r3 = io_uring_setup(0x767, &(0x7f0000000100)) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x11, r3, 0x4c9f1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) io_submit(r2, 0x9001, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0xff0f, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:42:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x21, 0x0) 12:42:50 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') getxattr(&(0x7f0000000080)='./file2\x00', &(0x7f0000000100)=@random={'user.', '$\x00'}, &(0x7f0000000140)=""/169, 0xa9) 12:42:50 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f000000a6c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$lock(r0, 0x1, 0x0) 12:42:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001700)='/dev/null\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x5451, 0x0) 12:42:51 executing program 0: sync() open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') lremovexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000200)=@known='trusted.overlay.nlink\x00') 12:42:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, 0x0, 0x0) [ 138.828596][ T8290] input: syz1 as /devices/virtual/input/input5 12:42:51 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2, 0x0) write$P9_RFLUSH(r0, 0x0, 0x22) 12:42:51 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) [ 139.017336][ T8290] input: syz1 as /devices/virtual/input/input6 12:42:51 executing program 0: sync() open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') lremovexattr(&(0x7f0000000040)='./file2\x00', &(0x7f0000000200)=@known='trusted.overlay.nlink\x00') 12:42:51 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x61) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x41}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15, 0x61}, 0xfe4f) [ 139.286454][ T8323] input: syz1 as /devices/virtual/input/input7 12:42:51 executing program 1: ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)="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"}) faccessat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) 12:42:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@hopopts_2292={{0x18, 0x29, 0x4}}], 0xf}}], 0x1, 0x0) 12:42:51 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0xffffffffffffffe2, 0xd) write(r1, &(0x7f00000001c0), 0x100000110) r2 = epoll_create(0x2000007) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0xb0000001}) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00000002000000ff000000000000"], 0x14}, 0x1, 0x0, 0x0, 0x200440d1}, 0x0) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x500, 0x2e0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r3], 0x74}}, 0x24044801) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x8000) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@local, 0x4e20, 0x40, 0x4e21, 0x4, 0x0, 0x20, 0xa0, 0x5e}, {0x101, 0x3, 0xb8, 0xff, 0xfa4e, 0x1, 0x101, 0x76d1}, {0x3, 0x5, 0x9, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, {{@in=@local, 0x4d2, 0x3c}, 0x2, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1}}, 0xe8) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x0, 'ip6gretap0\x00'}) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0xc000) 12:42:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x5) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000040)={0xfffc, 0x0, 0x800}) 12:42:51 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2c0001, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 12:42:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @local, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 139.674977][ T8343] SET target dimension over the limit! 12:42:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) r1 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'ipvlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000140)=0x21b, 0x4) sendto$inet6(r0, &(0x7f0000000080)="03042a01093260004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55fe800000000000005ba514d40808efa000801610002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 12:42:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:51 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e24, @remote}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000140)='s', 0x1}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 12:42:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x2, 0x1}, 0x20) 12:42:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="8b"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x20, 0x2, [@TCA_U32_SEL={0x14}, @TCA_U32_CLASSID={0x8}]}}]}, 0x4c}}, 0x0) [ 139.834161][ T8360] SET target dimension over the limit! [ 139.863428][ T8365] SET target dimension over the limit! 12:42:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x69a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000c6fcdc0000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a0010"], 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x7, 0x2500, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) [ 139.997034][ T8378] SET target dimension over the limit! [ 140.027095][ T8380] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 140.046997][ T8380] team0: Device bridge0 is up. Set it down before adding it as a team port [ 140.095638][ T8381] team0: Device bridge0 is up. Set it down before adding it as a team port 12:42:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x14, 0x17, 0xa, 0x301}, 0x14}}, 0x0) 12:42:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x2, 0x1}, 0x20) 12:42:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) accept(r1, &(0x7f0000000080)=@phonet, &(0x7f0000000000)=0x80) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x14e24, 0x0, @rand_addr, 0xfffff7ab}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 12:42:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:52 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:52 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 140.617663][ T8400] SET target dimension over the limit! 12:42:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x2, 0x1}, 0x20) 12:42:52 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) [ 140.727983][ T8409] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:53 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 140.799109][ T8409] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:53 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x2, 0x1}, 0x20) 12:42:53 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 141.026142][ T8431] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 12:42:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:53 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:53 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000611200000000000095000000000000006169f3616b9516a27d179b611f18a65d4ac18e23fc66eab3f27d56a27a844814d68855bbe4bedcaace596f18a73ca1b5301edc1fb8435b72b4e42df74e156e0c63fff8a39d1f1646153ca3269f793c0a7608cc7bbbe6d4402b2b38ea204272426195db534a5d71de52ab467acad4f03c9b98ebaa4f602726c2ef48bad67ea8ea1a2db91104c66ac008b83541e12d255ed792d879be8bd2391872534bb4b85fc017ff9cb90914ba50d683e6f762c42b122ce192a69c614654c0ec7539b07e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$l2tp(0xa, 0x2, 0x73) 12:42:53 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:53 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 141.473165][ T8445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}]}}}]}, 0x38}}, 0x0) 12:42:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:53 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:53 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) [ 141.807120][ T8466] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:54 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) [ 141.967058][ T8478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:54 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 12:42:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 12:42:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:54 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 142.670624][ T8496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:55 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) [ 142.880524][ T8511] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:55 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:55 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:55 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:55 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 143.592092][ T8536] Cannot find add_set index 0 as target 12:42:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:55 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:55 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 143.782291][ T8550] Cannot find add_set index 0 as target 12:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:56 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:56 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) [ 144.470911][ T8575] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 144.481660][ T8573] Cannot find add_set index 0 as target 12:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) 12:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:56 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) [ 144.711797][ T8590] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 12:42:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) [ 144.932158][ T8605] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 12:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept(r0, 0x0, 0x0) 12:42:57 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:57 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:57 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) 12:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:57 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 145.557125][ T8630] Cannot find del_set index 0 as target 12:42:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:57 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:57 executing program 1: socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000000e05a5", 0x58}], 0x1) [ 145.730601][ T8645] Cannot find del_set index 0 as target 12:42:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 12:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) [ 145.894175][ T8659] Cannot find del_set index 0 as target 12:42:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 12:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) [ 146.114955][ T8672] --map-set only usable from mangle table 12:42:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 12:42:58 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 146.289363][ T8685] --map-set only usable from mangle table 12:42:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040), 0x0) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) 12:42:58 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040), 0x0) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 146.498603][ T8703] --map-set only usable from mangle table 12:42:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000611200000000000095000000000000006169f3616b9516a27d179b611f18a65d4ac18e23fc66eab3f27d56a27a844814d68855bbe4bedcaace596f18a73ca1b5301edc1fb8435b72b4e42df74e156e0c63fff8a39d1f1646153ca3269f793c0a7608cc7bbbe6d4402b2b38ea204272426195db534a5d71de52ab467acad4f03c9b98ebaa4f602726c2ef48bad67ea8ea1a2db91104c66ac008b83541e12d255ed792d879be8bd2391872534bb4b85fc017ff9cb90914ba50d683e6f762c42b122ce192a69c614654c0ec7539b07e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0xd}, 0x10) 12:42:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040), 0x0) 12:42:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 146.695826][ T8719] xt_NFQUEUE: number of total queues is 0 12:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:59 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000611200000000000095000000000000006169f3616b9516a27d179b611f18a65d4ac18e23fc66eab3f27d56a27a844814d68855bbe4bedcaace596f18a73ca1b5301edc1fb8435b72b4e42df74e156e0c63fff8a39d1f1646153ca3269f793c0a7608cc7bbbe6d4402b2b38ea204272426195db534a5d71de52ab467acad4f03c9b98ebaa4f602726c2ef48bad67ea8ea1a2db91104c66ac008b83541e12d255ed792d879be8bd2391872534bb4b85fc017ff9cb90914ba50d683e6f762c42b122ce192a69c614654c0ec7539b07e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) socket$l2tp(0x2, 0x2, 0x73) 12:42:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) [ 146.847602][ T8731] xt_NFQUEUE: number of total queues is 0 12:42:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x0, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@ip={@private, @private, 0x0, 0x0, 'veth1_to_hsr\x00', 'team_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0xfd}, {0xffff}, {0xffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 12:42:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 146.999419][ T8742] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 147.011149][ T8742] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 147.011866][ T8744] xt_NFQUEUE: number of total queues is 0 [ 147.019579][ T8742] CPU: 0 PID: 8742 Comm: syz-executor.5 Not tainted 5.7.0-rc7-next-20200529-syzkaller #0 [ 147.019588][ T8742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.019622][ T8742] RIP: 0010:inet_unhash+0x11f/0x750 [ 147.019638][ T8742] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 147.019646][ T8742] RSP: 0018:ffffc900036afd40 EFLAGS: 00010202 [ 147.019657][ T8742] RAX: dffffc0000000000 RBX: ffff88808aef9940 RCX: ffffc90014026000 [ 147.019665][ T8742] RDX: 0000000000000001 RSI: ffffffff86a22451 RDI: 0000000000000008 [ 147.019673][ T8742] RBP: 0000000000000000 R08: ffff8880a6e3e340 R09: fffffbfff155b432 [ 147.019696][ T8742] R10: ffffffff8aada18f R11: fffffbfff155b431 R12: ffff88808aef99b0 [ 147.019703][ T8742] R13: 0000000000000000 R14: ffff88808aef9940 R15: ffffffff8745ca20 [ 147.019714][ T8742] FS: 00007f17423b1700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 147.019721][ T8742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.019730][ T8742] CR2: 0000000000507310 CR3: 000000008febb000 CR4: 00000000001406f0 [ 147.019747][ T8742] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.147403][ T8742] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 147.155359][ T8742] Call Trace: [ 147.158647][ T8742] ? l2tp_ip_getname+0x360/0x360 [ 147.163615][ T8742] ? l2tp_ip_destroy_sock+0x250/0x250 [ 147.168973][ T8742] sk_common_release+0xba/0x370 [ 147.173826][ T8742] inet_create+0x97e/0xe20 [ 147.178236][ T8742] __sock_create+0x3ca/0x730 [ 147.182820][ T8742] __sys_socket+0xef/0x200 [ 147.187223][ T8742] ? move_addr_to_kernel+0x70/0x70 [ 147.192319][ T8742] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 147.197862][ T8742] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 147.203829][ T8742] __x64_sys_socket+0x6f/0xb0 [ 147.208505][ T8742] do_syscall_64+0x60/0xe0 [ 147.212910][ T8742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.218798][ T8742] RIP: 0033:0x45ca69 [ 147.222689][ T8742] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.242308][ T8742] RSP: 002b:00007f17423b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 12:42:59 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x1c}, 0xfffffff0}}, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffefb, &(0x7f000000b600)=[{&(0x7f0000002e80)=""/167, 0x2000a890}], 0x1}, 0x0) 12:42:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:59 executing program 3: 12:42:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 12:42:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{0x0}], 0x1) [ 147.250739][ T8742] RAX: ffffffffffffffda RBX: 0000000000507300 RCX: 000000000045ca69 [ 147.258732][ T8742] RDX: 0000000000000073 RSI: 0000000000000002 RDI: 0000000000000002 [ 147.266700][ T8742] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 147.274677][ T8742] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 147.282633][ T8742] R13: 0000000000000b92 R14: 00000000004cdead R15: 00007f17423b16d4 [ 147.290605][ T8742] Modules linked in: 12:42:59 executing program 3: 12:42:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:42:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 147.489605][ T8742] ---[ end trace 4df4db2c21a2eafe ]--- [ 147.503433][ T8742] RIP: 0010:inet_unhash+0x11f/0x750 [ 147.509493][ T8742] Code: 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e c8 04 00 00 48 8d 7d 08 44 8b 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5b 05 00 00 48 8d 7d 14 4c 8b 75 08 48 b8 00 00 [ 147.530576][ T8742] RSP: 0018:ffffc900036afd40 EFLAGS: 00010202 [ 147.544679][ T8742] RAX: dffffc0000000000 RBX: ffff88808aef9940 RCX: ffffc90014026000 [ 147.552686][ T8742] RDX: 0000000000000001 RSI: ffffffff86a22451 RDI: 0000000000000008 [ 147.566858][ T8742] RBP: 0000000000000000 R08: ffff8880a6e3e340 R09: fffffbfff155b432 [ 147.578034][ T8742] R10: ffffffff8aada18f R11: fffffbfff155b431 R12: ffff88808aef99b0 [ 147.587988][ T8742] R13: 0000000000000000 R14: ffff88808aef9940 R15: ffffffff8745ca20 [ 147.596501][ T8742] FS: 00007f17423b1700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 147.606308][ T8742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.612953][ T8742] CR2: 000000000073efd4 CR3: 000000008febb000 CR4: 00000000001406f0 [ 147.621724][ T8742] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.630290][ T8742] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 147.639859][ T8742] Kernel panic - not syncing: Fatal exception [ 147.646898][ T8742] Kernel Offset: disabled [ 147.651208][ T8742] Rebooting in 86400 seconds..