IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready BUG: unable to handle kernel NULL pointer dereference at 0000000000000012 PGD 80000001303a3067 P4D 80000001303a3067 PUD 1301d9067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 5248 Comm: syz.0.249 Not tainted 4.20.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:reuseport_add_sock+0x5d/0x190 net/core/sock_reuseport.c:170 Code: c7 c7 60 90 5f 83 e8 e2 b0 3b 00 4d 8b b5 40 04 00 00 48 8b 9b 40 04 00 00 4d 85 f6 74 0c 66 41 83 7e 12 01 0f 85 13 01 00 00 <0f> b7 43 12 49 89 dc 66 3b 43 10 74 48 4c 89 6c c3 28 66 83 43 12 RSP: 0018:ffffc90002157e08 EFLAGS: 00010246 RAX: ffffffff8212b95e RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffffffff831bcdf2 RDI: ffffffff83078166 RBP: ffffc90002157e38 R08: 0000000000000000 R09: 0000000040b3f662 R10: 0000000000000000 R11: ffff88813049e678 R12: ffff8881302ffa00 R13: ffff888131d9e200 R14: 0000000000000000 R15: ffff888131d9e200 FS: 00007f4d7ee066c0(0000) GS:ffff88813bb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000012 CR3: 0000000133f7c000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __sctp_hash_endpoint net/sctp/input.c:758 [inline] sctp_hash_endpoint+0x165/0x170 net/sctp/input.c:786 sctp_listen_start net/sctp/socket.c:7875 [inline] sctp_inet_listen+0x13e/0x1d0 net/sctp/socket.c:7930 __sys_listen+0x6c/0xb0 net/socket.c:1517 __do_sys_listen net/socket.c:1526 [inline] __se_sys_listen net/socket.c:1524 [inline] __x64_sys_listen+0x11/0x20 net/socket.c:1524 do_syscall_64+0x55/0x140 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f4d7f37e299 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4d7ee06048 EFLAGS: 00000246 ORIG_RAX: 0000000000000032 RAX: ffffffffffffffda RBX: 00007f4d7f50cf80 RCX: 00007f4d7f37e299 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 RBP: 00007f4d7f3eb8e6 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f4d7f50cf80 R15: 00007fff0cac4078 Modules linked in: CR2: 0000000000000012 ---[ end trace d4c88256bdbe9559 ]--- RIP: 0010:reuseport_add_sock+0x5d/0x190 net/core/sock_reuseport.c:170 Code: c7 c7 60 90 5f 83 e8 e2 b0 3b 00 4d 8b b5 40 04 00 00 48 8b 9b 40 04 00 00 4d 85 f6 74 0c 66 41 83 7e 12 01 0f 85 13 01 00 00 <0f> b7 43 12 49 89 dc 66 3b 43 10 74 48 4c 89 6c c3 28 66 83 43 12 RSP: 0018:ffffc90002157e08 EFLAGS: 00010246 RAX: ffffffff8212b95e RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffffffff831bcdf2 RDI: ffffffff83078166 RBP: ffffc90002157e38 R08: 0000000000000000 R09: 0000000040b3f662 R10: 0000000000000000 R11: ffff88813049e678 R12: ffff8881302ffa00 R13: ffff888131d9e200 R14: 0000000000000000 R15: ffff888131d9e200 FS: 00007f4d7ee066c0(0000) GS:ffff88813bb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000012 CR3: 0000000133f7c000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: c7 c7 60 90 5f 83 mov $0x835f9060,%edi 6: e8 e2 b0 3b 00 call 0x3bb0ed b: 4d 8b b5 40 04 00 00 mov 0x440(%r13),%r14 12: 48 8b 9b 40 04 00 00 mov 0x440(%rbx),%rbx 19: 4d 85 f6 test %r14,%r14 1c: 74 0c je 0x2a 1e: 66 41 83 7e 12 01 cmpw $0x1,0x12(%r14) 24: 0f 85 13 01 00 00 jne 0x13d * 2a: 0f b7 43 12 movzwl 0x12(%rbx),%eax <-- trapping instruction 2e: 49 89 dc mov %rbx,%r12 31: 66 3b 43 10 cmp 0x10(%rbx),%ax 35: 74 48 je 0x7f 37: 4c 89 6c c3 28 mov %r13,0x28(%rbx,%rax,8) 3c: 66 data16 3d: 83 .byte 0x83 3e: 43 rex.XB 3f: 12 .byte 0x12