[info] Using makefile-style concurrent boot in runlevel 2. [ 47.076098][ T27] audit: type=1800 audit(1586848685.566:21): pid=7528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 47.128308][ T27] audit: type=1800 audit(1586848685.566:22): pid=7528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.5' (ECDSA) to the list of known hosts. 2020/04/14 07:18:18 fuzzer started 2020/04/14 07:18:20 dialing manager at 10.128.0.105:39077 2020/04/14 07:18:20 syscalls: 2957 2020/04/14 07:18:20 code coverage: enabled 2020/04/14 07:18:20 comparison tracing: enabled 2020/04/14 07:18:20 extra coverage: enabled 2020/04/14 07:18:20 setuid sandbox: enabled 2020/04/14 07:18:20 namespace sandbox: enabled 2020/04/14 07:18:20 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/14 07:18:20 fault injection: enabled 2020/04/14 07:18:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/14 07:18:20 net packet injection: enabled 2020/04/14 07:18:20 net device setup: enabled 2020/04/14 07:18:20 concurrency sanitizer: enabled 2020/04/14 07:18:20 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/14 07:18:20 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 62.906078][ T7693] KCSAN: could not find function: 'poll_schedule_timeout' [ 66.510715][ T7693] KCSAN: could not find function: '_find_next_bit' 2020/04/14 07:18:27 adding functions to KCSAN blacklist: 'poll_schedule_timeout' 'do_syslog' 'ext4_setattr' 'snd_seq_prioq_cell_out' 'ep_poll' 'do_nanosleep' 'ext4_sync_file' 'audit_log_start' 'do_signal_stop' 'do_msgrcv' 'ext4_mark_iloc_dirty' 'ext4_free_inodes_count' 'blk_mq_sched_dispatch_requests' 'kauditd_thread' 'ktime_get_real_seconds' 'generic_update_time' 'n_tty_receive_buf_common' 'ktime_get_seconds' 'ext4_mb_good_group' 'dd_has_work' 'ext4_writepages' 'lruvec_lru_size' 'do_readlinkat' 'atime_needs_update' 'run_timer_softirq' 'shmem_file_read_iter' '__mark_inode_dirty' 'xas_clear_mark' 'page_counter_try_charge' '__filemap_fdatawrite_range' 'ext4_nonda_switch' 'mod_timer' '_find_next_bit' 'tick_sched_do_timer' 'find_get_pages_range_tag' 'list_lru_count_one' 'add_timer' 'wbt_done' 'shmem_add_to_page_cache' 'iptunnel_xmit' '__ext4_new_inode' 'copy_process' 'blk_mq_get_request' 'generic_fillattr' 'ext4_has_free_clusters' 'wbt_issue' 'blk_mq_dispatch_rq_list' '__add_to_page_cache_locked' 'xas_find_marked' 'tick_nohz_idle_stop_tick' 'echo_char' 'generic_write_end' 'futex_wait_queue_me' 07:21:35 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 07:21:35 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000340)={'syzkaller1\x00', 0x3281bfa8604144d3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x7}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4240a543) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x8100000, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0xa5, 0x2, 0xfff, 0x4d4f, 0x3f, 0x100000000}) [ 256.996651][ T7696] IPVS: ftp: loaded support on port[0] = 21 [ 257.081265][ T7696] chnl_net:caif_netlink_parms(): no params data found [ 257.145361][ T7700] IPVS: ftp: loaded support on port[0] = 21 [ 257.202022][ T7696] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.209165][ T7696] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.217214][ T7696] device bridge_slave_0 entered promiscuous mode [ 257.243442][ T7696] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.250522][ T7696] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.258360][ T7696] device bridge_slave_1 entered promiscuous mode [ 257.274911][ T7700] chnl_net:caif_netlink_parms(): no params data found 07:21:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x3c000000) [ 257.294403][ T7696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.323148][ T7696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.360553][ T7696] team0: Port device team_slave_0 added [ 257.373132][ T7696] team0: Port device team_slave_1 added [ 257.400276][ T7700] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.408469][ T7700] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.416493][ T7700] device bridge_slave_0 entered promiscuous mode [ 257.429328][ T7696] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.437732][ T7696] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.464666][ T7696] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.475821][ T7700] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.487080][ T7700] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.511849][ T7700] device bridge_slave_1 entered promiscuous mode [ 257.519174][ T7696] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.529042][ T7696] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.556116][ T7696] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.584214][ T7708] IPVS: ftp: loaded support on port[0] = 21 [ 257.587405][ T7700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 257.623367][ T7696] device hsr_slave_0 entered promiscuous mode 07:21:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x80c9, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x514e, 0x0, 0x7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 257.661386][ T7696] device hsr_slave_1 entered promiscuous mode [ 257.736149][ T7700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.799561][ T7700] team0: Port device team_slave_0 added [ 257.832851][ T7700] team0: Port device team_slave_1 added [ 257.845205][ T7710] IPVS: ftp: loaded support on port[0] = 21 [ 257.913445][ T7700] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.920474][ T7700] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.947855][ T7700] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 07:21:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0xa0) [ 257.960474][ T7700] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.968560][ T7700] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.995876][ T7700] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 258.057263][ T7708] chnl_net:caif_netlink_parms(): no params data found [ 258.075491][ T7696] netdevsim netdevsim0 netdevsim0: renamed from eth0 07:21:36 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x3c000000) [ 258.183174][ T7700] device hsr_slave_0 entered promiscuous mode [ 258.222147][ T7700] device hsr_slave_1 entered promiscuous mode [ 258.271514][ T7700] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 258.279093][ T7700] Cannot create hsr debugfs directory [ 258.298192][ T7696] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 258.383570][ T7696] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 258.424072][ T7696] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 258.507982][ T7713] IPVS: ftp: loaded support on port[0] = 21 [ 258.519126][ T7715] IPVS: ftp: loaded support on port[0] = 21 [ 258.551314][ T7710] chnl_net:caif_netlink_parms(): no params data found [ 258.620247][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.628007][ T7708] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.635875][ T7708] device bridge_slave_0 entered promiscuous mode [ 258.656144][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.663882][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.672404][ T7708] device bridge_slave_1 entered promiscuous mode [ 258.714922][ T7708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.728801][ T7700] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 258.763821][ T7700] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 258.825806][ T7708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 258.849197][ T7700] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 258.914109][ T7708] team0: Port device team_slave_0 added [ 258.919847][ T7710] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.927038][ T7710] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.934669][ T7710] device bridge_slave_0 entered promiscuous mode [ 258.941686][ T7700] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 258.997989][ T7708] team0: Port device team_slave_1 added [ 259.012906][ T7710] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.019966][ T7710] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.028810][ T7710] device bridge_slave_1 entered promiscuous mode [ 259.051823][ T7708] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 259.058804][ T7708] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 259.085428][ T7708] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 259.096639][ T7713] chnl_net:caif_netlink_parms(): no params data found [ 259.131630][ T7708] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 259.138684][ T7708] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 259.165020][ T7708] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 259.185320][ T7710] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.200179][ T7710] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 259.273075][ T7708] device hsr_slave_0 entered promiscuous mode [ 259.311469][ T7708] device hsr_slave_1 entered promiscuous mode [ 259.351170][ T7708] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 259.358769][ T7708] Cannot create hsr debugfs directory [ 259.367098][ T7715] chnl_net:caif_netlink_parms(): no params data found [ 259.388206][ T7710] team0: Port device team_slave_0 added [ 259.400063][ T7710] team0: Port device team_slave_1 added [ 259.442110][ T7710] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 259.449189][ T7710] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 259.483009][ T7710] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 259.512885][ T7710] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 259.520684][ T7710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 259.547320][ T7710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 259.561470][ T7696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.583152][ T7700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.618643][ T7713] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.625833][ T7713] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.633816][ T7713] device bridge_slave_0 entered promiscuous mode [ 259.642186][ T7713] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.649216][ T7713] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.657048][ T7713] device bridge_slave_1 entered promiscuous mode [ 259.703371][ T7710] device hsr_slave_0 entered promiscuous mode [ 259.751526][ T7710] device hsr_slave_1 entered promiscuous mode [ 259.831261][ T7710] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 259.838836][ T7710] Cannot create hsr debugfs directory [ 259.866176][ T7713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.875603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.884880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.896951][ T7696] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.905877][ T7715] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.913214][ T7715] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.921022][ T7715] device bridge_slave_0 entered promiscuous mode [ 259.928316][ T7708] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 259.983921][ T7713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 260.005786][ T7713] team0: Port device team_slave_0 added [ 260.011721][ T7715] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.018750][ T7715] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.026649][ T7715] device bridge_slave_1 entered promiscuous mode [ 260.043155][ T7708] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 260.086718][ T7708] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 260.134309][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.142875][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.151209][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.158257][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.166140][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.173914][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.182549][ T7713] team0: Port device team_slave_1 added [ 260.199142][ T7700] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.207832][ T7715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 260.219222][ T7715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 260.230399][ T7708] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 260.283237][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.294087][ T7713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 260.301046][ T7713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.327653][ T7713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 260.350876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.361532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.369956][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.377243][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.391404][ T7713] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 260.398381][ T7713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.424343][ T7713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 260.443530][ T7715] team0: Port device team_slave_0 added [ 260.453085][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.462464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.470977][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.478023][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.486545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.497562][ T7715] team0: Port device team_slave_1 added [ 260.518069][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.526274][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.535219][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.544193][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.553355][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.560382][ T7734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.579295][ T7715] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 260.586334][ T7715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.613129][ T7715] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 260.625761][ T7715] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 260.632770][ T7715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.659092][ T7715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 260.679840][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 260.701148][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.710090][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.718588][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.727397][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.736061][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.744512][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.752924][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.761248][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.769721][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.778212][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.843290][ T7713] device hsr_slave_0 entered promiscuous mode [ 260.902084][ T7713] device hsr_slave_1 entered promiscuous mode [ 260.941170][ T7713] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 260.948749][ T7713] Cannot create hsr debugfs directory [ 260.956826][ T7700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.965584][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.974368][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.983915][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 261.001159][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.009865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.018886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 261.027288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.035572][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 261.043926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.093511][ T7715] device hsr_slave_0 entered promiscuous mode [ 261.131463][ T7715] device hsr_slave_1 entered promiscuous mode [ 261.171227][ T7715] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 261.178803][ T7715] Cannot create hsr debugfs directory [ 261.217085][ T7696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 261.257099][ T7710] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 261.294312][ T7710] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 261.364261][ T7710] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 261.405131][ T7710] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 261.469684][ T7700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.493229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.500652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.519350][ T7696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.544614][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 261.552331][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 261.584970][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.596050][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.606626][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.615465][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.633280][ T7715] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 261.663462][ T7715] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 261.719486][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.728263][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.738709][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.746490][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.760038][ T7715] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 261.821160][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.829543][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.838356][ T7700] device veth0_vlan entered promiscuous mode [ 261.855822][ T7708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.863275][ T7715] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 261.903252][ T7696] device veth0_vlan entered promiscuous mode [ 261.909775][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.918070][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.931825][ T7713] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 261.973882][ T7713] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 262.023527][ T7713] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 262.082064][ T7700] device veth1_vlan entered promiscuous mode [ 262.093147][ T7713] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 262.143737][ T7696] device veth1_vlan entered promiscuous mode [ 262.168713][ T7708] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.184665][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 262.193370][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 262.201987][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 262.209818][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.217733][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.257750][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 262.266212][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.275058][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.283680][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.290704][ T7734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.298439][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.307241][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.315730][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.323033][ T7734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.330876][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.339532][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.349004][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.359082][ T7710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.373974][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.386609][ T7700] device veth0_macvtap entered promiscuous mode [ 262.402373][ T7700] device veth1_macvtap entered promiscuous mode [ 262.416688][ T7710] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.436808][ T7696] device veth0_macvtap entered promiscuous mode [ 262.444676][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.453258][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.461364][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.470243][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.478190][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.486473][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 262.495092][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.503991][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.512653][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.545171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 262.553496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.563507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 262.572641][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.583309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.591714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.599946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.609391][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.617829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.626963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.635884][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.643008][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.651890][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.660450][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.669043][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.676105][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.684677][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.697422][ T7708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 262.711257][ T7696] device veth1_macvtap entered promiscuous mode [ 262.722107][ T7700] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.732841][ T7715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.742853][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 262.753009][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.761873][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.782642][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.793501][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.806003][ T7696] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.826239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.835713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.844525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 262.856358][ T7700] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.873401][ T7696] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.884144][ T7696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.895943][ T7696] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.904577][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.915430][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.924402][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 262.932105][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 262.939792][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.948324][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.957305][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.965170][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.995888][ T7715] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.005774][ T7708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.017877][ T7713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.026741][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.036981][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.046561][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.055008][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.084906][ T7713] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.098535][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.107780][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.116505][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.124889][ T3644] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.131945][ T3644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.139907][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.148053][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.156155][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.164782][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.173258][ T3644] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.180273][ T3644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.188124][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.196478][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.205630][ T3644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.226646][ T7710] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 263.240325][ T7710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.263483][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.273074][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.281954][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.290906][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.300541][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.308948][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.317855][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.326634][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.335368][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.365139][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 263.376475][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.386600][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.397234][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.405761][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.412908][ T7734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.421072][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.429459][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.437753][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.446189][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.455438][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.474270][ T7715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.489429][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.500068][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.510823][ T7734] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.517903][ T7734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.549040][ T7708] device veth0_vlan entered promiscuous mode [ 263.564554][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.575951][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.583574][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.592847][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.602568][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.611481][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.620078][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.628961][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.649834][ T7708] device veth1_vlan entered promiscuous mode [ 263.661398][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.670832][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.679088][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.687751][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.699507][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.714510][ T7710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.730958][ T7715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.748749][ T7713] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 263.760524][ T7713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 263.776045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.784573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.794488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.803456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.811960][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.820225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.829167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.868935][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.888728][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.904623][ T7708] device veth0_macvtap entered promiscuous mode [ 263.917622][ T7708] device veth1_macvtap entered promiscuous mode [ 263.926887][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 263.938741][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.951007][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 263.958626][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 263.970265][ T7713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.995788][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.027391][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.048408][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 264.059689][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.071068][ T7708] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 264.117945][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.132001][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.150070][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.160661][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.170027][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.179374][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.204759][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.226407][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.237785][ T7708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 264.248535][ T7708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 264.260285][ T7708] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 264.269668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 264.292396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.301012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.322343][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.331380][ T7715] device veth0_vlan entered promiscuous mode [ 264.341217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.349113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.383570][ T7715] device veth1_vlan entered promiscuous mode [ 264.396591][ T7710] device veth0_vlan entered promiscuous mode [ 264.412434][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 264.421692][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 264.436779][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.453017][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.463898][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.503563][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 264.511983][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.526938][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.552005][ T7710] device veth1_vlan entered promiscuous mode [ 264.581499][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 264.616026][ T7713] device veth0_vlan entered promiscuous mode [ 264.630111][ T7715] device veth0_macvtap entered promiscuous mode [ 264.641737][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 264.650103][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.673535][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.690125][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.725098][ T7715] device veth1_macvtap entered promiscuous mode [ 264.736694][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.746324][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.757054][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 264.775635][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.783812][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.793079][ T2896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.804324][ T7713] device veth1_vlan entered promiscuous mode [ 264.817625][ T7710] device veth0_macvtap entered promiscuous mode [ 264.843504][ T7710] device veth1_macvtap entered promiscuous mode 07:21:43 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) [ 264.983573][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 264.991994][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 265.000245][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 265.020609][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.029540][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.041972][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.054291][ T7713] device veth0_macvtap entered promiscuous mode [ 265.064109][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.076168][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.089648][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.100392][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.113693][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 07:21:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4f}]}}) [ 265.125038][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.138989][ T7715] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 265.155859][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.201707][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.204676][ T7822] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 265.231269][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.245319][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.255987][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.269867][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.280731][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.294955][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.306918][ T7710] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 265.317919][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 265.338224][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.347390][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.359433][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.370084][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.382881][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 07:21:43 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2700000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000000000083109db421fc900000000000000ce204b707596"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@newchain={0x24, 0x25, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 265.421127][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.448317][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.471113][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.490872][ T7715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.502344][ T7715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.513858][ T7715] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 265.525023][ T7713] device veth1_macvtap entered promiscuous mode [ 265.541927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.550384][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.567052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.576478][ T7830] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 265.596188][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.621147][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.631743][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.642937][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.653146][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.663783][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.673728][ T7710] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 265.684740][ T7710] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.696074][ T7710] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 265.729184][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.743503][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.754306][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.769870][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.780692][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.801354][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.817504][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 07:21:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2811ffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 265.836610][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.850437][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 265.871574][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 265.883165][ T7713] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 265.892202][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.900837][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.914328][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.926761][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.945858][ T7829] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 265.972879][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 07:21:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x28402) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) [ 265.996494][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.024991][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 266.039467][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.049478][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 266.062489][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.076792][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 266.089197][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.100428][ T7713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 266.112563][ T7713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.124722][ T7713] batman_adv: batadv0: Interface activated: batadv_slave_1 07:21:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 266.147994][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.184707][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.387588][ T7876] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 266.417626][ T7876] FAT-fs (loop0): Filesystem has been set read-only [ 266.443381][ T7876] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 266.459474][ T7895] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) 07:21:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) [ 266.648924][ T7918] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 266.657102][ T7918] FAT-fs (loop0): Filesystem has been set read-only 07:21:45 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() tkill(r2, 0x29) process_vm_writev(0x0, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x45c4) [ 266.837827][ T7935] xt_CT: You must specify a L4 protocol and not use inversions on it 07:21:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:21:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x28402) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) 07:21:45 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() tkill(r2, 0x29) process_vm_writev(0x0, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:21:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\trus\xac\x84cusgrVex:De', 0x0) 07:21:45 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:21:45 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) [ 267.080358][ T7947] xt_CT: You must specify a L4 protocol and not use inversions on it [ 267.089695][ T7949] xt_CT: You must specify a L4 protocol and not use inversions on it [ 267.105504][ T7947] xt_CT: You must specify a L4 protocol and not use inversions on it 07:21:45 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:21:45 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) [ 267.233817][ T7965] xt_CT: You must specify a L4 protocol and not use inversions on it [ 267.307784][ T7969] xt_CT: You must specify a L4 protocol and not use inversions on it [ 267.336040][ T7973] xt_CT: You must specify a L4 protocol and not use inversions on it 07:21:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x28402) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)={0x0, 0x7672}) syz_open_procfs(0x0, 0x0) 07:21:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:21:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) pipe(0x0) 07:21:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:21:55 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) [ 276.875005][ T7996] xt_CT: You must specify a L4 protocol and not use inversions on it [ 277.818834][ T7708] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 277.827531][ T7708] FAT-fs (loop2): Filesystem has been set read-only [ 277.868446][ T7715] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 277.901022][ T7715] FAT-fs (loop5): Filesystem has been set read-only 07:22:45 executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)="d46eeb07bf6143644feefddb995419b47d4cab938a2d", 0x16}, {&(0x7f00000004c0)}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c}, {0x10, 0x0, 0x4}], 0x20}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5bfff673aac055f9d8e3fb3866976f341cd81d76076ea9edf6331410ecc0", 0xef}], 0x5, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:22:45 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f678767de016726c40ddca5de1a9756119f3446f894c0405681b1", 0x6d}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:22:45 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) 07:22:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\trus\xac\x84cusgrVex:De', 0x0) 07:22:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 07:22:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x28402) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)={0x0, 0x7672}) syz_open_procfs(0x0, 0x0) [ 327.293769][ T8032] xt_CT: You must specify a L4 protocol and not use inversions on it [ 327.313219][ T8036] xt_CT: You must specify a L4 protocol and not use inversions on it 07:22:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811ffff) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000180, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) pipe(0x0) 07:22:45 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f", 0x53}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) [ 327.348791][ T8039] xt_CT: You must specify a L4 protocol and not use inversions on it 07:22:46 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000780200000000004c00000000080100000000000008010000e0010000e0010000e0010000e0010000e001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80008010000000000000000000000000000000000000000280073746174650000000000000000000000000000000000000000000000000000000000000000004000636f6e6e6c696d697400000000000000000000000000000000ff0700000100000000000000000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000e0000001ac1414aa0000000000000000766361f9ff000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000040000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(0xffffffffffffffff) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000003500)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @dev}, &(0x7f0000000340)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000013c0)}, {0x0}, {&(0x7f0000001280)="33b3c5", 0x3}, {&(0x7f0000001500)}, {&(0x7f00000004c0)="688609000000b61372294eac824f8248c3d5a5db81363ea8b3f4a808d74390009ad5d45591d4e6ccf7737faecf0cd43b787e7c84d00b1e3413487d2ba6a58b3841a62f18a62c246b99c7d2a81f5893393aea5f678767de016726c40ddca5de1a9756119f3446f894c0405681b1", 0x6d}], 0x5, &(0x7f0000001780)=[{0x10, 0x10c, 0x3}, {0x10, 0x0, 0x4}, {0x10, 0x119}], 0x30}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000001ac0)}, {0x0}, {&(0x7f0000000540)="3e0e3300201e4891ed36a27368de9ac840630bcdc5ff851860ddd5474bd753e697e3de566d466110afa39cc234a1030ca2d184f07095e55d5aed9f40f0439ce80d1a1b4fe008827dd90eca88c1007c0d374c09f47fa991eef21272d5cc1fbb8e8061467fa0f6e74f2353d6b056024d4b7f5ebbd381ba1564717380fda7dca7d9f4b04960d3e6382b6f2da5de90b482f6d70f814dd956b12f2e65aeb27b32c6df5cb05adb6664f332c61b44eec720cbebd9acc068f9bfd7a06fb6f6bf306221fb2d19fa4c14deb0fba31091d5982b1ef79f5b", 0xd2}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB]}}, {{&(0x7f0000001cc0)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000480)={{0x0, 0x0, @reserved="75a254d9e2833f783d926962072d98ce6ebd9e559036ab9e5505f7b26d880500"}}) r2 = gettid() tkill(r2, 0x29) process_vm_writev(r2, 0x0, 0x0, &(0x7f00000016c0), 0x0, 0x0) sched_setparam(0x0, &(0x7f0000000400)=0x9) prctl$PR_SVE_GET_VL(0x33, 0x45c4) [ 327.581475][ T8048] xt_CT: You must specify a L4 protocol and not use inversions on it [ 327.625898][ T8050] ================================================================== [ 327.634298][ T8050] BUG: KCSAN: data-race in fat16_ent_put / fat_get_short_entry [ 327.641933][ T8050] [ 327.644304][ T8050] write to 0xffff88810900c2ca of 2 bytes by task 8029 on cpu 0: [ 327.651955][ T8050] fat16_ent_put+0x54/0x90 [ 327.656413][ T8050] fat_ent_write+0x69/0xf0 [ 327.660832][ T8050] fat_chain_add+0x356/0x410 [ 327.665430][ T8050] fat_add_cluster+0x91/0xd0 [ 327.670025][ T8050] fat_fallocate+0x13b/0x1d0 [ 327.674623][ T8050] vfs_fallocate+0x3b1/0x650 [ 327.679219][ T8050] ksys_fallocate+0x5b/0xa0 [ 327.683720][ T8050] __x64_sys_fallocate+0x59/0x70 [ 327.688667][ T8050] do_syscall_64+0xc7/0x390 [ 327.693177][ T8050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.699246][ T8050] [ 327.701590][ T8050] read to 0xffff88810900c2cb of 1 bytes by task 8050 on cpu 1: [ 327.709171][ T8050] fat_get_short_entry+0x146/0x1d0 [ 327.714296][ T8050] fat_scan+0xb7/0x190 [ 327.718383][ T8050] vfat_find_form+0x3a/0xb0 [ 327.722894][ T8050] vfat_add_entry+0x18f9/0x1b50 [ 327.727757][ T8050] vfat_mkdir+0xbb/0x310 [ 327.732097][ T8050] vfs_mkdir+0x281/0x390 [ 327.736351][ T8050] do_mkdirat+0x1b5/0x200 [ 327.742011][ T8050] __x64_sys_mkdir+0x3d/0x50 [ 327.746771][ T8050] do_syscall_64+0xc7/0x390 [ 327.751278][ T8050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.757252][ T8050] [ 327.759570][ T8050] Reported by Kernel Concurrency Sanitizer on: [ 327.765814][ T8050] CPU: 1 PID: 8050 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 327.774480][ T8050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.784624][ T8050] ================================================================== [ 327.792683][ T8050] Kernel panic - not syncing: panic_on_warn set ... [ 327.799365][ T8050] CPU: 1 PID: 8050 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 327.808035][ T8050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.818121][ T8050] Call Trace: [ 327.821748][ T8050] dump_stack+0x11d/0x187 [ 327.826108][ T8050] panic+0x210/0x640 [ 327.830027][ T8050] ? vprintk_func+0x89/0x13a [ 327.834759][ T8050] kcsan_report.cold+0xc/0xf [ 327.839456][ T8050] kcsan_setup_watchpoint+0x3fb/0x440 [ 327.844854][ T8050] fat_get_short_entry+0x146/0x1d0 [ 327.850001][ T8050] fat_scan+0xb7/0x190 [ 327.854131][ T8050] vfat_find_form+0x3a/0xb0 [ 327.859935][ T8050] vfat_add_entry+0x18f9/0x1b50 [ 327.864871][ T8050] vfat_mkdir+0xbb/0x310 [ 327.869139][ T8050] ? security_inode_permission+0xa0/0xb0 [ 327.874788][ T8050] vfs_mkdir+0x281/0x390 [ 327.879059][ T8050] do_mkdirat+0x1b5/0x200 [ 327.883418][ T8050] __x64_sys_mkdir+0x3d/0x50 [ 327.888027][ T8050] do_syscall_64+0xc7/0x390 [ 327.892546][ T8050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.898432][ T8050] RIP: 0033:0x45c889 [ 327.902354][ T8050] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.921960][ T8050] RSP: 002b:00007f6de242dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 327.930464][ T8050] RAX: ffffffffffffffda RBX: 00007f6de242e6d4 RCX: 000000000045c889 [ 327.938438][ T8050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 327.946416][ T8050] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 327.954403][ T8050] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 327.962379][ T8050] R13: 000000000000072e R14: 00000000004c234d R15: 000000000076bfac [ 327.972230][ T8050] Kernel Offset: disabled [ 327.976555][ T8050] Rebooting in 86400 seconds..