[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.114' (ECDSA) to the list of known hosts. 2022/09/08 11:32:42 fuzzer started 2022/09/08 11:32:42 dialing manager at 10.128.0.163:35605 2022/09/08 11:32:44 syscalls: 3525 2022/09/08 11:32:44 code coverage: enabled 2022/09/08 11:32:44 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2022/09/08 11:32:44 extra coverage: extra coverage is not supported by the kernel 2022/09/08 11:32:44 delay kcov mmap: mmap returned an invalid pointer 2022/09/08 11:32:44 setuid sandbox: enabled 2022/09/08 11:32:44 namespace sandbox: enabled 2022/09/08 11:32:44 Android sandbox: /sys/fs/selinux/policy does not exist 2022/09/08 11:32:44 fault injection: enabled 2022/09/08 11:32:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/09/08 11:32:44 net packet injection: enabled 2022/09/08 11:32:44 net device setup: enabled 2022/09/08 11:32:44 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/08 11:32:44 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/08 11:32:44 USB emulation: /dev/raw-gadget does not exist 2022/09/08 11:32:44 hci packet injection: enabled 2022/09/08 11:32:44 wifi device emulation: kernel 4.17 required (have 4.14.292-syzkaller) 2022/09/08 11:32:44 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2022/09/08 11:32:44 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/08 11:32:44 fetching corpus: 50, signal 45927/49548 (executing program) 2022/09/08 11:32:44 fetching corpus: 100, signal 67814/72960 (executing program) 2022/09/08 11:32:44 fetching corpus: 149, signal 88010/94528 (executing program) 2022/09/08 11:32:44 fetching corpus: 199, signal 102274/110096 (executing program) 2022/09/08 11:32:44 fetching corpus: 249, signal 110415/119582 (executing program) 2022/09/08 11:32:45 fetching corpus: 299, signal 117626/128110 (executing program) 2022/09/08 11:32:45 fetching corpus: 349, signal 126887/138510 (executing program) 2022/09/08 11:32:45 fetching corpus: 399, signal 136847/149532 (executing program) 2022/09/08 11:32:45 fetching corpus: 449, signal 146479/160122 (executing program) 2022/09/08 11:32:45 fetching corpus: 497, signal 153974/168622 (executing program) 2022/09/08 11:32:45 fetching corpus: 546, signal 158992/174764 (executing program) 2022/09/08 11:32:45 fetching corpus: 595, signal 163689/180490 (executing program) 2022/09/08 11:32:45 fetching corpus: 642, signal 171544/189177 (executing program) 2022/09/08 11:32:46 fetching corpus: 692, signal 178526/196948 (executing program) 2022/09/08 11:32:46 fetching corpus: 742, signal 184083/203328 (executing program) 2022/09/08 11:32:46 fetching corpus: 791, signal 189057/209207 (executing program) 2022/09/08 11:32:46 fetching corpus: 841, signal 193610/214591 (executing program) 2022/09/08 11:32:46 fetching corpus: 891, signal 197907/219710 (executing program) 2022/09/08 11:32:46 fetching corpus: 941, signal 203617/226079 (executing program) 2022/09/08 11:32:46 fetching corpus: 989, signal 208006/231189 (executing program) 2022/09/08 11:32:47 fetching corpus: 1039, signal 211402/235325 (executing program) 2022/09/08 11:32:47 fetching corpus: 1088, signal 215599/240195 (executing program) 2022/09/08 11:32:47 fetching corpus: 1138, signal 219461/244743 (executing program) 2022/09/08 11:32:47 fetching corpus: 1188, signal 224115/249960 (executing program) 2022/09/08 11:32:47 fetching corpus: 1238, signal 229091/255393 (executing program) 2022/09/08 11:32:47 fetching corpus: 1288, signal 232690/259601 (executing program) 2022/09/08 11:32:47 fetching corpus: 1338, signal 237088/264429 (executing program) 2022/09/08 11:32:48 fetching corpus: 1387, signal 239409/267417 (executing program) 2022/09/08 11:32:48 fetching corpus: 1437, signal 242915/271450 (executing program) 2022/09/08 11:32:48 fetching corpus: 1486, signal 247541/276449 (executing program) 2022/09/08 11:32:48 fetching corpus: 1536, signal 250512/279965 (executing program) 2022/09/08 11:32:48 fetching corpus: 1585, signal 253625/283576 (executing program) 2022/09/08 11:32:49 fetching corpus: 1634, signal 256330/286798 (executing program) 2022/09/08 11:32:49 fetching corpus: 1682, signal 258730/289744 (executing program) 2022/09/08 11:32:49 fetching corpus: 1731, signal 261476/292948 (executing program) 2022/09/08 11:32:49 fetching corpus: 1781, signal 264190/296091 (executing program) 2022/09/08 11:32:49 fetching corpus: 1828, signal 267357/299623 (executing program) 2022/09/08 11:32:49 fetching corpus: 1878, signal 270333/302933 (executing program) 2022/09/08 11:32:49 fetching corpus: 1927, signal 273830/306632 (executing program) 2022/09/08 11:32:49 fetching corpus: 1977, signal 276055/309267 (executing program) 2022/09/08 11:32:50 fetching corpus: 2027, signal 278680/312219 (executing program) 2022/09/08 11:32:50 fetching corpus: 2076, signal 281527/315329 (executing program) 2022/09/08 11:32:50 fetching corpus: 2126, signal 284646/318646 (executing program) 2022/09/08 11:32:50 fetching corpus: 2175, signal 286654/321063 (executing program) 2022/09/08 11:32:50 fetching corpus: 2225, signal 289021/323720 (executing program) 2022/09/08 11:32:50 fetching corpus: 2275, signal 291254/326239 (executing program) 2022/09/08 11:32:50 fetching corpus: 2323, signal 292970/328288 (executing program) 2022/09/08 11:32:50 fetching corpus: 2371, signal 296089/331461 (executing program) 2022/09/08 11:32:51 fetching corpus: 2420, signal 297944/333653 (executing program) 2022/09/08 11:32:51 fetching corpus: 2468, signal 299997/335995 (executing program) 2022/09/08 11:32:51 fetching corpus: 2518, signal 301501/337886 (executing program) 2022/09/08 11:32:51 fetching corpus: 2567, signal 303242/339970 (executing program) 2022/09/08 11:32:51 fetching corpus: 2617, signal 305096/342051 (executing program) 2022/09/08 11:32:51 fetching corpus: 2667, signal 307221/344342 (executing program) 2022/09/08 11:32:51 fetching corpus: 2717, signal 308958/346392 (executing program) 2022/09/08 11:32:52 fetching corpus: 2766, signal 310469/348232 (executing program) 2022/09/08 11:32:52 fetching corpus: 2816, signal 312249/350172 (executing program) 2022/09/08 11:32:52 fetching corpus: 2866, signal 313689/351940 (executing program) 2022/09/08 11:32:52 fetching corpus: 2916, signal 314977/353576 (executing program) 2022/09/08 11:32:52 fetching corpus: 2965, signal 317311/355961 (executing program) 2022/09/08 11:32:52 fetching corpus: 3014, signal 319581/358294 (executing program) 2022/09/08 11:32:52 fetching corpus: 3063, signal 321099/360019 (executing program) 2022/09/08 11:32:52 fetching corpus: 3113, signal 322548/361713 (executing program) 2022/09/08 11:32:52 fetching corpus: 3163, signal 324924/364028 (executing program) 2022/09/08 11:32:52 fetching corpus: 3213, signal 326399/365666 (executing program) 2022/09/08 11:32:53 fetching corpus: 3263, signal 328104/367466 (executing program) 2022/09/08 11:32:53 fetching corpus: 3313, signal 330299/369605 (executing program) 2022/09/08 11:32:53 fetching corpus: 3363, signal 332619/371795 (executing program) 2022/09/08 11:32:53 fetching corpus: 3412, signal 334331/373577 (executing program) 2022/09/08 11:32:53 fetching corpus: 3462, signal 335924/375308 (executing program) 2022/09/08 11:32:53 fetching corpus: 3509, signal 337460/376948 (executing program) 2022/09/08 11:32:53 fetching corpus: 3559, signal 338617/378247 (executing program) 2022/09/08 11:32:54 fetching corpus: 3609, signal 340628/380126 (executing program) 2022/09/08 11:32:54 fetching corpus: 3659, signal 342174/381686 (executing program) 2022/09/08 11:32:54 fetching corpus: 3709, signal 343784/383277 (executing program) 2022/09/08 11:32:54 fetching corpus: 3759, signal 345055/384615 (executing program) 2022/09/08 11:32:54 fetching corpus: 3809, signal 347269/386615 (executing program) 2022/09/08 11:32:54 fetching corpus: 3859, signal 348663/388039 (executing program) 2022/09/08 11:32:54 fetching corpus: 3909, signal 349843/389307 (executing program) 2022/09/08 11:32:54 fetching corpus: 3956, signal 351191/390672 (executing program) 2022/09/08 11:32:55 fetching corpus: 4006, signal 352688/392166 (executing program) 2022/09/08 11:32:55 fetching corpus: 4056, signal 353794/393342 (executing program) 2022/09/08 11:32:55 fetching corpus: 4105, signal 355826/395109 (executing program) 2022/09/08 11:32:55 fetching corpus: 4154, signal 356919/396249 (executing program) 2022/09/08 11:32:55 fetching corpus: 4204, signal 358378/397586 (executing program) 2022/09/08 11:32:55 fetching corpus: 4253, signal 360524/399384 (executing program) 2022/09/08 11:32:55 fetching corpus: 4303, signal 361809/400644 (executing program) 2022/09/08 11:32:56 fetching corpus: 4353, signal 363700/402248 (executing program) 2022/09/08 11:32:56 fetching corpus: 4403, signal 365176/403585 (executing program) 2022/09/08 11:32:56 fetching corpus: 4453, signal 366235/404650 (executing program) 2022/09/08 11:32:56 fetching corpus: 4503, signal 367652/405933 (executing program) 2022/09/08 11:32:56 fetching corpus: 4553, signal 368928/407104 (executing program) 2022/09/08 11:32:56 fetching corpus: 4603, signal 370224/408271 (executing program) 2022/09/08 11:32:56 fetching corpus: 4653, signal 370995/409128 (executing program) 2022/09/08 11:32:57 fetching corpus: 4703, signal 371965/410090 (executing program) 2022/09/08 11:32:57 fetching corpus: 4752, signal 373366/411352 (executing program) 2022/09/08 11:32:57 fetching corpus: 4802, signal 375565/412979 (executing program) 2022/09/08 11:32:57 fetching corpus: 4852, signal 377292/414309 (executing program) 2022/09/08 11:32:57 fetching corpus: 4902, signal 378493/415363 (executing program) 2022/09/08 11:32:57 fetching corpus: 4951, signal 379558/416395 (executing program) 2022/09/08 11:32:57 fetching corpus: 5001, signal 380550/417345 (executing program) 2022/09/08 11:32:58 fetching corpus: 5051, signal 382177/418615 (executing program) 2022/09/08 11:32:58 fetching corpus: 5101, signal 383179/419493 (executing program) 2022/09/08 11:32:58 fetching corpus: 5151, signal 384742/420739 (executing program) 2022/09/08 11:32:58 fetching corpus: 5201, signal 386273/421956 (executing program) 2022/09/08 11:32:58 fetching corpus: 5251, signal 387720/423095 (executing program) 2022/09/08 11:32:58 fetching corpus: 5301, signal 388797/423982 (executing program) 2022/09/08 11:32:58 fetching corpus: 5351, signal 390136/424995 (executing program) 2022/09/08 11:32:59 fetching corpus: 5401, signal 392211/426413 (executing program) 2022/09/08 11:32:59 fetching corpus: 5451, signal 393712/427498 (executing program) 2022/09/08 11:32:59 fetching corpus: 5501, signal 395004/428450 (executing program) 2022/09/08 11:32:59 fetching corpus: 5551, signal 396078/429281 (executing program) 2022/09/08 11:32:59 fetching corpus: 5601, signal 397074/430100 (executing program) 2022/09/08 11:32:59 fetching corpus: 5651, signal 398972/431323 (executing program) 2022/09/08 11:33:00 fetching corpus: 5701, signal 400201/432220 (executing program) 2022/09/08 11:33:00 fetching corpus: 5751, signal 401033/432922 (executing program) 2022/09/08 11:33:00 fetching corpus: 5801, signal 402481/433895 (executing program) 2022/09/08 11:33:00 fetching corpus: 5851, signal 403374/434575 (executing program) 2022/09/08 11:33:00 fetching corpus: 5901, signal 404342/435296 (executing program) 2022/09/08 11:33:00 fetching corpus: 5951, signal 405306/436012 (executing program) 2022/09/08 11:33:00 fetching corpus: 6001, signal 406507/436825 (executing program) 2022/09/08 11:33:01 fetching corpus: 6051, signal 408402/437971 (executing program) 2022/09/08 11:33:01 fetching corpus: 6101, signal 409457/438703 (executing program) 2022/09/08 11:33:01 fetching corpus: 6151, signal 410393/439367 (executing program) 2022/09/08 11:33:01 fetching corpus: 6201, signal 411489/440090 (executing program) 2022/09/08 11:33:01 fetching corpus: 6251, signal 412494/440746 (executing program) 2022/09/08 11:33:01 fetching corpus: 6301, signal 413475/441438 (executing program) 2022/09/08 11:33:01 fetching corpus: 6351, signal 414378/442049 (executing program) 2022/09/08 11:33:02 fetching corpus: 6401, signal 415293/442698 (executing program) 2022/09/08 11:33:02 fetching corpus: 6451, signal 416770/443568 (executing program) 2022/09/08 11:33:02 fetching corpus: 6501, signal 417726/444205 (executing program) 2022/09/08 11:33:02 fetching corpus: 6551, signal 418454/444741 (executing program) 2022/09/08 11:33:02 fetching corpus: 6601, signal 419348/445303 (executing program) 2022/09/08 11:33:02 fetching corpus: 6651, signal 420310/445908 (executing program) 2022/09/08 11:33:02 fetching corpus: 6701, signal 421427/446524 (executing program) 2022/09/08 11:33:03 fetching corpus: 6751, signal 422315/447105 (executing program) 2022/09/08 11:33:03 fetching corpus: 6801, signal 423406/447701 (executing program) 2022/09/08 11:33:03 fetching corpus: 6851, signal 424266/448213 (executing program) 2022/09/08 11:33:03 fetching corpus: 6901, signal 425304/448783 (executing program) 2022/09/08 11:33:03 fetching corpus: 6951, signal 425925/449182 (executing program) 2022/09/08 11:33:03 fetching corpus: 7001, signal 426686/449641 (executing program) 2022/09/08 11:33:03 fetching corpus: 7051, signal 427456/450085 (executing program) 2022/09/08 11:33:03 fetching corpus: 7101, signal 428621/450678 (executing program) 2022/09/08 11:33:04 fetching corpus: 7151, signal 429414/451140 (executing program) 2022/09/08 11:33:04 fetching corpus: 7201, signal 430517/451672 (executing program) 2022/09/08 11:33:04 fetching corpus: 7251, signal 431318/452085 (executing program) 2022/09/08 11:33:04 fetching corpus: 7301, signal 432112/452500 (executing program) 2022/09/08 11:33:04 fetching corpus: 7351, signal 433032/452966 (executing program) 2022/09/08 11:33:04 fetching corpus: 7401, signal 433784/453390 (executing program) 2022/09/08 11:33:05 fetching corpus: 7451, signal 434514/453790 (executing program) 2022/09/08 11:33:05 fetching corpus: 7501, signal 435556/454281 (executing program) 2022/09/08 11:33:05 fetching corpus: 7551, signal 436620/454754 (executing program) 2022/09/08 11:33:05 fetching corpus: 7601, signal 437333/455113 (executing program) 2022/09/08 11:33:05 fetching corpus: 7651, signal 438117/455482 (executing program) 2022/09/08 11:33:05 fetching corpus: 7701, signal 438758/455785 (executing program) 2022/09/08 11:33:05 fetching corpus: 7751, signal 439375/456112 (executing program) 2022/09/08 11:33:06 fetching corpus: 7801, signal 439976/456412 (executing program) 2022/09/08 11:33:06 fetching corpus: 7851, signal 440892/456841 (executing program) 2022/09/08 11:33:06 fetching corpus: 7901, signal 441647/457178 (executing program) 2022/09/08 11:33:06 fetching corpus: 7951, signal 442625/457568 (executing program) 2022/09/08 11:33:06 fetching corpus: 8001, signal 443421/457871 (executing program) 2022/09/08 11:33:06 fetching corpus: 8051, signal 444130/458174 (executing program) 2022/09/08 11:33:07 fetching corpus: 8101, signal 444776/458437 (executing program) 2022/09/08 11:33:07 fetching corpus: 8151, signal 445625/458801 (executing program) 2022/09/08 11:33:07 fetching corpus: 8201, signal 446299/459065 (executing program) 2022/09/08 11:33:07 fetching corpus: 8251, signal 447047/459370 (executing program) 2022/09/08 11:33:07 fetching corpus: 8301, signal 447884/459711 (executing program) 2022/09/08 11:33:08 fetching corpus: 8351, signal 448943/460063 (executing program) 2022/09/08 11:33:08 fetching corpus: 8401, signal 449554/460292 (executing program) 2022/09/08 11:33:08 fetching corpus: 8451, signal 452203/461064 (executing program) 2022/09/08 11:33:08 fetching corpus: 8501, signal 453141/461337 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461404 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461446 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461487 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461539 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461586 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461630 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461677 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461722 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461762 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461817 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461860 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461908 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/461964 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462012 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462070 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462124 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462185 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462236 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462284 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462331 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462377 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462418 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462470 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462522 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462571 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462611 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462656 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462709 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462748 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462804 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462844 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462891 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462937 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/462989 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463031 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463078 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463127 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463180 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463228 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463273 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463326 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463375 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463423 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463480 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463517 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463561 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463601 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463656 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463714 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463774 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463820 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463861 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463897 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463940 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/463987 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464036 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464082 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464138 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464186 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464237 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464238 (executing program) 2022/09/08 11:33:08 fetching corpus: 8510, signal 453228/464238 (executing program) 2022/09/08 11:33:10 starting 6 fuzzer processes 11:33:10 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 11:33:10 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) 11:33:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xc4000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) fcntl$setstatus(r1, 0x4, 0x2800) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r0, 0x0, 0x7ffff000) 11:33:10 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) syzkaller login: [ 59.059363] IPVS: ftp: loaded support on port[0] = 21 [ 59.138065] IPVS: ftp: loaded support on port[0] = 21 [ 59.241772] IPVS: ftp: loaded support on port[0] = 21 [ 59.260329] chnl_net:caif_netlink_parms(): no params data found [ 59.334717] chnl_net:caif_netlink_parms(): no params data found [ 59.365638] IPVS: ftp: loaded support on port[0] = 21 [ 59.492790] chnl_net:caif_netlink_parms(): no params data found [ 59.518659] IPVS: ftp: loaded support on port[0] = 21 [ 59.629760] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.638023] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.645433] device bridge_slave_0 entered promiscuous mode [ 59.662235] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.668714] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.676042] device bridge_slave_1 entered promiscuous mode [ 59.690218] chnl_net:caif_netlink_parms(): no params data found [ 59.703059] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.709422] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.717178] device bridge_slave_0 entered promiscuous mode [ 59.726385] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.732824] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.739705] device bridge_slave_1 entered promiscuous mode [ 59.776025] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.798484] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.820846] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.824124] IPVS: ftp: loaded support on port[0] = 21 [ 59.860171] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.895414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.902695] team0: Port device team_slave_0 added [ 59.910732] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.919126] team0: Port device team_slave_1 added [ 59.931578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.938667] team0: Port device team_slave_0 added [ 59.950217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.957533] team0: Port device team_slave_1 added [ 59.982643] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 59.988895] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.014657] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.025383] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.032832] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.039725] device bridge_slave_0 entered promiscuous mode [ 60.068802] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.075124] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.100633] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.112233] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.118819] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.144236] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.154640] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.161661] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.168585] device bridge_slave_1 entered promiscuous mode [ 60.191391] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.197652] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.223425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.234251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.269558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.276961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.289909] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.296767] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.305111] device bridge_slave_0 entered promiscuous mode [ 60.333256] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.341228] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.366599] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.373135] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.380003] device bridge_slave_1 entered promiscuous mode [ 60.401379] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.427749] device hsr_slave_0 entered promiscuous mode [ 60.434174] device hsr_slave_1 entered promiscuous mode [ 60.476082] device hsr_slave_0 entered promiscuous mode [ 60.482348] device hsr_slave_1 entered promiscuous mode [ 60.488172] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 60.499794] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.509054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.517412] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.524768] team0: Port device team_slave_0 added [ 60.529940] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 60.537193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 60.544166] chnl_net:caif_netlink_parms(): no params data found [ 60.573317] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.580386] team0: Port device team_slave_1 added [ 60.585652] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 60.646168] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.653867] team0: Port device team_slave_0 added [ 60.663556] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.669808] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.695929] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.726934] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.734269] team0: Port device team_slave_1 added [ 60.739858] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.746350] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.772014] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 60.787314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.816391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.913239] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 60.919493] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.944747] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 60.958845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 60.965163] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 60.990404] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.007428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.017520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.029983] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.037142] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.044675] device bridge_slave_0 entered promiscuous mode [ 61.060313] chnl_net:caif_netlink_parms(): no params data found [ 61.078037] device hsr_slave_0 entered promiscuous mode [ 61.084337] Bluetooth: hci4 command 0x0409 tx timeout [ 61.089697] Bluetooth: hci2 command 0x0409 tx timeout [ 61.090881] Bluetooth: hci5 command 0x0409 tx timeout [ 61.096409] Bluetooth: hci0 command 0x0409 tx timeout [ 61.104357] device hsr_slave_1 entered promiscuous mode [ 61.106368] Bluetooth: hci3 command 0x0409 tx timeout [ 61.115904] Bluetooth: hci1 command 0x0409 tx timeout [ 61.116526] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 61.130372] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 61.137279] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.143766] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.150650] device bridge_slave_1 entered promiscuous mode [ 61.215185] device hsr_slave_0 entered promiscuous mode [ 61.221606] device hsr_slave_1 entered promiscuous mode [ 61.238632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.257028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 61.274228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.292806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 61.326014] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.355190] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.369241] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.377218] team0: Port device team_slave_0 added [ 61.413412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.420501] team0: Port device team_slave_1 added [ 61.490156] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.496679] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.504488] device bridge_slave_0 entered promiscuous mode [ 61.511591] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.517932] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.525591] device bridge_slave_1 entered promiscuous mode [ 61.532486] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 61.538721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.564324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 61.578830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 61.585197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 61.610432] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 61.625093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.647630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.655340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.664467] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.708726] device hsr_slave_0 entered promiscuous mode [ 61.714414] device hsr_slave_1 entered promiscuous mode [ 61.722867] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.744428] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.761490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.768835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.776512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 61.786237] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.811455] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 61.845929] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.859891] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 61.868789] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.884758] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.892154] team0: Port device team_slave_0 added [ 61.913032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.925005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.932757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.940397] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.946846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.954614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.962464] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.969471] team0: Port device team_slave_1 added [ 61.976359] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.993532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.001309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.009039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.017130] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.023548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.041361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.062543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.081952] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.089462] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.100531] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 62.107167] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.122885] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.129130] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.154680] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.165299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.172320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.183382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.192883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.212128] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.218377] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.243939] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 62.255254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.262960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.270434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.280679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.294310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.321053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.329027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.337319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.345267] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.351677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.362088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.372247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.379999] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.391000] device hsr_slave_0 entered promiscuous mode [ 62.396749] device hsr_slave_1 entered promiscuous mode [ 62.411709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 62.419375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.427061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.435033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.443111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.449908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.457032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.464880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.472554] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.478895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.487481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.496659] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 62.503085] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.514093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.520400] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 62.529770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.537766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.545199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.553014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.560494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.570215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 62.580117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.596257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.604339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.612314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.620016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.628116] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.634515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.642271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.652527] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.662971] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.671352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.687826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 62.697984] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.704505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.712724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.720257] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.726642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.733980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.741602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.748979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.756053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.764271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.786289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 62.792502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.800132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.812899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.821223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.838581] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 62.844957] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.853088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.862168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.869771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.878216] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.888296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.898394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.912226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.920450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.928713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.937404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.945307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.953329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.961318] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.967679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.974847] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.982248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.992178] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 62.999198] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 63.007135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.020420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.031780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 63.038873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.046382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.053720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.061728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.069180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.077515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.085848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.093975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.105741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.125361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 63.134681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.145046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 63.153255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.160975] Bluetooth: hci1 command 0x041b tx timeout [ 63.161637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.168908] Bluetooth: hci3 command 0x041b tx timeout [ 63.173775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.184737] Bluetooth: hci0 command 0x041b tx timeout [ 63.186725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.191504] Bluetooth: hci5 command 0x041b tx timeout [ 63.199919] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.204247] Bluetooth: hci2 command 0x041b tx timeout [ 63.210033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.225114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.233015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.240417] Bluetooth: hci4 command 0x041b tx timeout [ 63.251140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 63.261264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.271157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.279498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.287280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.295112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.303574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.317315] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 63.327788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.341547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.358091] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 63.365067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.383688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.391648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.399479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 63.421256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.429970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.444328] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 63.453732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.463297] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.472327] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 63.479652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.488095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.497334] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 63.505994] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 63.515264] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 63.522905] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 63.530664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.537398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.544460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.551480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.558130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 63.566632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.579674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.587177] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.597893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.607435] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 63.624330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.633214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.640183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.651081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.660951] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 63.667040] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.679098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 63.696038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.705373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.715723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.724397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.732569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.740118] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.746499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.753908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.761986] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 63.768001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.778636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.793017] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 63.802077] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 63.808704] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 63.817497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.825708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.833798] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.840123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.860055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.871598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.879590] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 63.888029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.896732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.906558] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 63.916438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.924973] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 63.937574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.944133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 63.951607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.958961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.967087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.975326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.982332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.989114] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.996265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.003299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.011605] device veth0_vlan entered promiscuous mode [ 64.027937] device veth1_vlan entered promiscuous mode [ 64.034852] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 64.043177] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 64.053528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.062607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.070111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 64.078009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.086239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.095668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 64.107004] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 64.119467] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 64.127845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 64.136707] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.149166] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 64.158830] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 64.166866] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 64.175101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.183418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.191135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.197990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.205298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.213355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.221488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.229184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.239346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 64.250759] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 64.262664] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 64.268753] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.276425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.289609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.299785] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 64.306150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.316257] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 64.326511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 64.335920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.344408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.352205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.359879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.368298] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.374795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.386718] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 64.394194] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 64.401441] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 64.411168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 64.421494] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 64.428494] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 64.435467] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 64.444350] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 64.451299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.458321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.466444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.474117] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.480515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.489123] device veth0_macvtap entered promiscuous mode [ 64.495505] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 64.507969] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 64.517594] device veth0_vlan entered promiscuous mode [ 64.527042] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 64.534460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.542035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.549410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.556946] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.566759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.575007] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 64.582902] device veth1_macvtap entered promiscuous mode [ 64.588937] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 64.597708] device veth1_vlan entered promiscuous mode [ 64.604038] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 64.612340] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 64.619512] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 64.626842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 64.634215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.642503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.649132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.658010] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 64.667541] device veth0_vlan entered promiscuous mode [ 64.677451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.685106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.692944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.701359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.709121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.716530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.724900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 64.739934] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 64.750050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.764199] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.778326] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 64.786896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 64.797287] device veth1_vlan entered promiscuous mode [ 64.803563] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 64.809940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 64.817587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.825432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.833417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.841546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.849240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.859394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.872990] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 64.882933] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 64.890075] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.900544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.908193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.917488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.925651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.933474] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.941808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.952240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 64.961675] device veth0_macvtap entered promiscuous mode [ 64.967714] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 64.977367] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 64.986035] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 64.993005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.002296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 65.009744] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 65.017188] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 65.024579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.032387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.039744] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.047525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.055377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.062990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.107135] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 65.116990] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 65.126082] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 65.132972] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 65.142019] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 65.148054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.163134] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 65.170525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.178240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.194603] device veth1_macvtap entered promiscuous mode [ 65.202779] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 65.210052] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 65.220041] device veth0_vlan entered promiscuous mode [ 65.232649] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.239836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.241239] Bluetooth: hci2 command 0x040f tx timeout [ 65.251397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.255584] Bluetooth: hci5 command 0x040f tx timeout [ 65.261090] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.271788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.273656] Bluetooth: hci0 command 0x040f tx timeout [ 65.284174] device veth0_macvtap entered promiscuous mode [ 65.290217] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 65.297172] Bluetooth: hci3 command 0x040f tx timeout [ 65.300851] device veth1_macvtap entered promiscuous mode [ 65.302540] Bluetooth: hci1 command 0x040f tx timeout [ 65.313855] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 65.324326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 65.332180] Bluetooth: hci4 command 0x040f tx timeout [ 65.333104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 65.348739] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 65.359155] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 65.375272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 65.385507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 65.396890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.407160] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 65.414246] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.422040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 65.432308] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 65.441511] device veth1_vlan entered promiscuous mode [ 65.450704] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 65.457607] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 65.465010] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.472461] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 65.479587] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.488662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.497084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 65.504948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.513534] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 65.524549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.534295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 65.544050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.554024] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 65.561629] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 65.569212] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 65.586467] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 65.593821] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 65.601335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.609134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.617462] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.624660] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.635262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 65.646159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.656228] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 65.663527] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.671330] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 65.681878] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.691668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 65.701855] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 65.712236] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 65.719089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 65.730928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.738844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.747119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.755055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.771267] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 65.782817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.817358] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 65.826077] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 65.833175] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 65.842335] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 65.857209] device veth0_macvtap entered promiscuous mode [ 65.863856] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 65.875723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.886147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.897665] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 65.912621] device veth1_macvtap entered promiscuous mode [ 65.918923] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 65.928285] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 65.937102] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.945147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.953051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.961866] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.968972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.979928] device veth0_vlan entered promiscuous mode [ 65.993368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 66.009517] device veth1_vlan entered promiscuous mode [ 66.029134] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 66.039485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 66.054042] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 66.068044] hrtimer: interrupt took 23814 ns [ 66.078641] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 66.106178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.115413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 11:33:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) [ 66.126980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.137188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 66.150576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.162938] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 66.169924] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.182425] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 66.192948] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 66.206044] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 66.217599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 11:33:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) [ 66.226801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.236759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.250451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.259660] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.287686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.296911] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.306861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.317585] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 66.324641] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.333809] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 66.350740] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 66.363942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.373862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.388419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.416639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 11:33:18 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) [ 66.434195] device veth0_macvtap entered promiscuous mode [ 66.444983] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 66.455711] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 66.469697] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 66.477279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.495661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.505850] device veth1_macvtap entered promiscuous mode [ 66.514294] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 66.536623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 11:33:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xc4000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) fcntl$setstatus(r1, 0x4, 0x2800) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r0, 0x0, 0x7ffff000) 11:33:19 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) [ 66.587753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 66.625389] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 11:33:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xc4000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) fcntl$setstatus(r1, 0x4, 0x2800) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r0, 0x0, 0x7ffff000) [ 66.659191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.676854] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 66.700693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.711590] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 66.721705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.731213] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 66.741021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.751439] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 66.758589] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.775640] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 66.796812] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 66.821560] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 66.829531] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.839762] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.855324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.865648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.879347] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.888995] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.899259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.908462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.918309] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.928113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 66.938017] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 66.948053] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 66.955389] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 66.964511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.972578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 66.983360] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 66.996492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.004541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.015754] device veth0_vlan entered promiscuous mode [ 67.022285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.029397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.046591] device veth1_vlan entered promiscuous mode [ 67.053108] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 67.074186] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 67.099125] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 67.119040] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 67.135993] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 67.145964] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 67.155214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.166480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.192695] device veth0_macvtap entered promiscuous mode [ 67.199016] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 67.214915] attempt to access beyond end of device [ 67.219978] loop2: rw=1, want=128, limit=15 [ 67.224041] device veth1_macvtap entered promiscuous mode [ 67.234299] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 67.248610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 67.263339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 67.278481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 67.291538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.300831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 67.310817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.319914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 67.320812] Bluetooth: hci1 command 0x0419 tx timeout [ 67.330736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.340658] Bluetooth: hci3 command 0x0419 tx timeout [ 67.344133] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 67.353988] Bluetooth: hci0 command 0x0419 tx timeout [ 67.358846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.365385] Bluetooth: hci5 command 0x0419 tx timeout [ 67.373380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 67.383239] Bluetooth: hci2 command 0x0419 tx timeout [ 67.388332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.406406] Bluetooth: hci4 command 0x0419 tx timeout [ 67.406926] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 67.418676] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.426174] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 67.433976] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.443418] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.451541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.461579] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 67.472536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.482329] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 67.492091] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.501266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 67.511064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.520225] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 67.529916] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.539266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 67.549033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.559567] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 67.567549] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.578640] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.587015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.894949] [ 67.896574] ====================================================== [ 67.902876] WARNING: possible circular locking dependency detected [ 67.909184] 4.14.292-syzkaller #0 Not tainted [ 67.913659] ------------------------------------------------------ [ 67.919953] modprobe/9547 is trying to acquire lock: [ 67.925026] (&(&gsm->tx_lock)->rlock){-...}, at: [] gsmld_write_wakeup+0x4e/0xd0 [ 67.934301] [ 67.934301] but task is already holding lock: [ 67.940247] (&port_lock_key){-.-.}, at: [] serial8250_handle_irq.part.0+0x20/0x330 [ 67.949584] [ 67.949584] which lock already depends on the new lock. [ 67.949584] [ 67.957872] [ 67.957872] the existing dependency chain (in reverse order) is: [ 67.965465] [ 67.965465] -> #1 (&port_lock_key){-.-.}: [ 67.971076] _raw_spin_lock_irqsave+0x8c/0xc0 [ 67.976074] uart_write_room+0xd5/0x340 [ 67.980542] tty_write_room+0x61/0x80 [ 67.984836] gsmld_write+0x69/0x120 [ 67.988973] tty_write+0x410/0x740 [ 67.993011] __vfs_write+0xe4/0x630 [ 67.997139] __kernel_write+0xf5/0x330 [ 68.001527] write_pipe_buf+0x143/0x1c0 [ 68.005998] __splice_from_pipe+0x326/0x7a0 [ 68.010812] default_file_splice_write+0xc5/0x150 [ 68.016165] direct_splice_actor+0x115/0x160 [ 68.021068] splice_direct_to_actor+0x25a/0x700 [ 68.026231] do_splice_direct+0x164/0x210 [ 68.030870] do_sendfile+0x47f/0xb30 [ 68.035079] SyS_sendfile64+0xff/0x110 [ 68.039472] do_syscall_64+0x1d5/0x640 [ 68.043852] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 68.049532] [ 68.049532] -> #0 (&(&gsm->tx_lock)->rlock){-...}: [ 68.055936] lock_acquire+0x170/0x3f0 [ 68.060230] _raw_spin_lock_irqsave+0x8c/0xc0 [ 68.065218] gsmld_write_wakeup+0x4e/0xd0 [ 68.069862] tty_wakeup+0xc3/0xf0 [ 68.073807] tty_port_default_wakeup+0x26/0x40 [ 68.078914] serial8250_tx_chars+0x3fe/0xc70 [ 68.083821] serial8250_handle_irq.part.0+0x28d/0x330 [ 68.089504] serial8250_default_handle_irq+0x8a/0x1f0 [ 68.095187] serial8250_interrupt+0xf3/0x210 [ 68.100091] __handle_irq_event_percpu+0xee/0x7f0 [ 68.105427] handle_irq_event+0xed/0x240 [ 68.109986] handle_edge_irq+0x224/0xc40 [ 68.114555] handle_irq+0x35/0x50 [ 68.118502] do_IRQ+0x93/0x1d0 [ 68.122203] ret_from_intr+0x0/0x1e [ 68.126325] lock_acquire+0x1ec/0x3f0 [ 68.130620] down_read_trylock+0x4e/0x90 [ 68.135174] __do_page_fault+0x2b9/0xad0 [ 68.139733] page_fault+0x45/0x50 [ 68.143678] [ 68.143678] other info that might help us debug this: [ 68.143678] [ 68.151792] Possible unsafe locking scenario: [ 68.151792] [ 68.157819] CPU0 CPU1 [ 68.162457] ---- ---- [ 68.167095] lock(&port_lock_key); [ 68.170694] lock(&(&gsm->tx_lock)->rlock); [ 68.177604] lock(&port_lock_key); [ 68.183723] lock(&(&gsm->tx_lock)->rlock); [ 68.188104] [ 68.188104] *** DEADLOCK *** [ 68.188104] [ 68.194144] 4 locks held by modprobe/9547: [ 68.198346] #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x2b9/0xad0 [ 68.206993] #1: (&(&i->lock)->rlock){-.-.}, at: [] serial8250_interrupt+0x3a/0x210 [ 68.216416] #2: (&port_lock_key){-.-.}, at: [] serial8250_handle_irq.part.0+0x20/0x330 [ 68.226187] #3: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref+0x1b/0x80 [ 68.234668] [ 68.234668] stack backtrace: [ 68.239140] CPU: 1 PID: 9547 Comm: modprobe Not tainted 4.14.292-syzkaller #0 [ 68.246385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 68.255716] Call Trace: [ 68.258273] [ 68.260402] dump_stack+0x1b2/0x281 [ 68.264009] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 68.269781] __lock_acquire+0x2e0e/0x3f20 [ 68.273909] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 68.279261] ? trace_hardirqs_on+0x10/0x10 [ 68.283483] ? trace_hardirqs_on+0x10/0x10 [ 68.287702] ? trace_hardirqs_on+0x10/0x10 [ 68.291914] lock_acquire+0x170/0x3f0 [ 68.295700] ? gsmld_write_wakeup+0x4e/0xd0 [ 68.300014] ? lock_downgrade+0x740/0x740 [ 68.304146] _raw_spin_lock_irqsave+0x8c/0xc0 [ 68.308621] ? gsmld_write_wakeup+0x4e/0xd0 [ 68.312933] ? gsm_dlci_data_sweep+0x1b0/0x1b0 [ 68.317488] gsmld_write_wakeup+0x4e/0xd0 [ 68.321610] ? gsm_dlci_data_sweep+0x1b0/0x1b0 [ 68.326185] tty_wakeup+0xc3/0xf0 [ 68.329617] tty_port_default_wakeup+0x26/0x40 [ 68.334180] serial8250_tx_chars+0x3fe/0xc70 [ 68.338562] serial8250_handle_irq.part.0+0x28d/0x330 [ 68.343727] serial8250_default_handle_irq+0x8a/0x1f0 [ 68.348902] serial8250_interrupt+0xf3/0x210 [ 68.353292] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 68.358726] ? serial8250_backup_timeout+0x440/0x440 [ 68.363802] __handle_irq_event_percpu+0xee/0x7f0 [ 68.368618] handle_irq_event+0xed/0x240 [ 68.372671] ? handle_irq_event_percpu+0x110/0x110 [ 68.377577] handle_edge_irq+0x224/0xc40 [ 68.381614] handle_irq+0x35/0x50 [ 68.385043] do_IRQ+0x93/0x1d0 [ 68.388230] common_interrupt+0x93/0x93 [ 68.392174] 11:33:20 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) [ 68.394387] RIP: 0010:lock_acquire+0x1ec/0x3f0 [ 68.398938] RSP: 0000:ffff88806ffe7e38 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffc8 [ 68.406628] RAX: 1ffffffff11e1359 RBX: ffff8880a9796200 RCX: bd6f10cc5c7f380f [ 68.413876] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000286 [ 68.421132] RBP: ffff8880a88d5a50 R08: 0000000000000001 R09: 0000000000058405 [ 68.428404] R10: ffff8880a9796a88 R11: ffff8880a9796200 R12: 0000000000000000 [ 68.435674] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000001 [ 68.442969] ? do_sys_open+0x208/0x410 [ 68.446875] down_read_trylock+0x4e/0x90 [ 68.450918] ? __do_page_fault+0x2b9/0xad0 [ 68.455127] __do_page_fault+0x2b9/0xad0 [ 68.459167] ? spurious_fault+0x640/0x640 [ 68.463290] ? do_page_fault+0x60/0x500 [ 68.467240] ? page_fault+0x2f/0x50 [ 68.470872] page_fault+0x45/0x50 [ 68.474320] RIP: f867678c:0x55df851ab150 11:33:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xc4000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) fcntl$setstatus(r1, 0x4, 0x2800) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r0, 0x0, 0x7ffff000) 11:33:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) 11:33:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 68.478368] RSP: 0000:000055df851ab240 EFLAGS: 7ffdf867678c [ 68.619828] attempt to access beyond end of device [ 68.630696] loop2: rw=1, want=128, limit=15 11:33:21 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:21 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20) r1 = creat(&(0x7f0000000600)='./bus\x00', 0x0) dup3(r1, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x400, 0x2e0, 0x0, 0x2}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x0, 0x0, 0x8, 0x0, 0x9fbc, 0x4000, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6a73}, 0x44800, 0x80000000, 0xc8, 0x0, 0x3, 0xa19, 0x1f, 0x0, 0x40, 0x0, 0x5a70}, 0x0, 0x8, 0xffffffffffffffff, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) 11:33:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) [ 68.866373] attempt to access beyond end of device [ 68.871695] loop2: rw=1, want=128, limit=15 11:33:21 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 11:33:21 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x12) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}, @TCA_STAB={0x4}]}, 0x30}}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0xae71, 0x0) 11:33:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:21 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) [ 69.371219] attempt to access beyond end of device [ 69.376183] loop2: rw=1, want=128, limit=15 11:33:21 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:22 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 69.590978] attempt to access beyond end of device [ 69.595967] loop2: rw=1, want=128, limit=15 [ 69.629455] attempt to access beyond end of device [ 69.635711] loop3: rw=1, want=128, limit=15 11:33:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 69.699282] attempt to access beyond end of device [ 69.704689] loop2: rw=1, want=128, limit=15 [ 69.854986] attempt to access beyond end of device [ 69.860618] loop3: rw=1, want=128, limit=15 [ 69.898620] attempt to access beyond end of device [ 69.903823] loop2: rw=1, want=128, limit=15 11:33:22 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 11:33:22 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x200002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 11:33:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:22 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 11:33:22 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) sendfile(r0, r1, 0x0, 0x20000023896) 11:33:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') [ 70.272396] attempt to access beyond end of device [ 70.277361] loop3: rw=1, want=128, limit=15 11:33:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)) read$msr(r0, &(0x7f0000000240)=""/194, 0xc2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 11:33:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:33:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:33:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:33:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000640)='sysfs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x1f, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8000, 0x0, 0x5, 0x1, 0x1, 0x2, 0x0, 0x0, 0x7, 0x0, 0x80000002}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) mount$bpf(0x0, &(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000740), 0x10, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0xc) mount$overlay(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000c00), 0x0, &(0x7f0000000c40)={[], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x18}}, {@permit_directio}, {@appraise}, {@euid_lt}]}) syz_mount_image$gfs2meta(&(0x7f0000000480), &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="80a60bff0479e237665d21a0cf03e55174b08e16c35d6dfbb64d634f356836ed4a1e176bea6de356dfd92cf12d12caf63ff906fce6f9fd92e5601db80c2047edf96fc8a9f842ec86c558951a1bfcc60c598949b16eb229111b14accc55826a429c3f972a99d6bf0387efc2c20c7056d3634585dfa21c7a50f592e7c631894d88091df1fd2f604425a353fe9a2f9ffbf3057d0aedf8f66fe7eb", 0x99}, {&(0x7f0000000880)="fe08459c96a4863f90bb61eb0a49b85ebdc7d9d452387ed6b13c4a642fd5ff22f4a0ce4ade2e1cdac9fee81da3738c016050bc86cbe12b7d0a1a3d73bd962094a67e76364d047147e48e0aa0cae9ab995b244f6df03cf6f2b9922856ac307efd02edce09cc5b37d82aec4c81a32832c9486a4903b0a4eedfc5177a1c3a1a70d51362290e143c05247a66c0f63f0516360b7d1fd8e24b5541ace52177b0bfde0056e8", 0xa2, 0x6}, {&(0x7f0000000940)="36352c9ef8478e5662c8ca287c9ff07edbcc", 0x12, 0x5}], 0xa804, 0x0) creat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 11:33:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 11:33:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0, 0x0) 11:33:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 11:33:24 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000340)=ANY=[@ANYBLOB="3be000000100000054f3460000000000000060000000000000", @ANYRES32=r0, @ANYBLOB="01040000000000002e2f66696c653000"]) r2 = msgget$private(0x0, 0x606) msgctl$IPC_SET(0x0, 0x1, 0x0) msgsnd(r2, &(0x7f0000000100)=A