[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.89' (ECDSA) to the list of known hosts. 2022/04/20 15:26:58 fuzzer started 2022/04/20 15:26:58 dialing manager at 10.128.0.163:44473 2022/04/20 15:26:59 syscalls: 3480 2022/04/20 15:26:59 code coverage: enabled 2022/04/20 15:26:59 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2022/04/20 15:26:59 extra coverage: extra coverage is not supported by the kernel 2022/04/20 15:26:59 delay kcov mmap: mmap returned an invalid pointer 2022/04/20 15:26:59 setuid sandbox: enabled 2022/04/20 15:26:59 namespace sandbox: enabled 2022/04/20 15:26:59 Android sandbox: /sys/fs/selinux/policy does not exist 2022/04/20 15:26:59 fault injection: enabled 2022/04/20 15:26:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/04/20 15:26:59 net packet injection: enabled 2022/04/20 15:26:59 net device setup: enabled 2022/04/20 15:26:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/04/20 15:26:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/04/20 15:26:59 USB emulation: /dev/raw-gadget does not exist 2022/04/20 15:26:59 hci packet injection: enabled 2022/04/20 15:26:59 wifi device emulation: kernel 4.17 required (have 4.14.276-syzkaller) 2022/04/20 15:26:59 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2022/04/20 15:26:59 fetching corpus: 0, signal 0/2000 (executing program) 2022/04/20 15:26:59 fetching corpus: 50, signal 51382/54981 (executing program) 2022/04/20 15:26:59 fetching corpus: 99, signal 72923/78054 (executing program) 2022/04/20 15:26:59 fetching corpus: 145, signal 89025/95597 (executing program) 2022/04/20 15:27:00 fetching corpus: 194, signal 98509/106518 (executing program) 2022/04/20 15:27:00 fetching corpus: 244, signal 111649/120957 (executing program) 2022/04/20 15:27:00 fetching corpus: 294, signal 121682/132261 (executing program) 2022/04/20 15:27:00 fetching corpus: 343, signal 130576/142334 (executing program) 2022/04/20 15:27:01 fetching corpus: 389, signal 141044/153906 (executing program) 2022/04/20 15:27:01 fetching corpus: 437, signal 148173/162168 (executing program) 2022/04/20 15:27:01 fetching corpus: 485, signal 156841/171883 (executing program) 2022/04/20 15:27:02 fetching corpus: 534, signal 161584/177789 (executing program) 2022/04/20 15:27:02 fetching corpus: 584, signal 166801/184012 (executing program) 2022/04/20 15:27:02 fetching corpus: 634, signal 173546/191716 (executing program) 2022/04/20 15:27:02 fetching corpus: 684, signal 178724/197908 (executing program) 2022/04/20 15:27:03 fetching corpus: 732, signal 184145/204254 (executing program) 2022/04/20 15:27:03 fetching corpus: 780, signal 191493/212314 (executing program) 2022/04/20 15:27:03 fetching corpus: 830, signal 196989/218594 (executing program) 2022/04/20 15:27:04 fetching corpus: 877, signal 204511/226820 (executing program) 2022/04/20 15:27:04 fetching corpus: 926, signal 208113/231318 (executing program) 2022/04/20 15:27:04 fetching corpus: 974, signal 212772/236732 (executing program) 2022/04/20 15:27:04 fetching corpus: 1023, signal 218727/243293 (executing program) 2022/04/20 15:27:05 fetching corpus: 1072, signal 221888/247260 (executing program) 2022/04/20 15:27:05 fetching corpus: 1120, signal 224820/251026 (executing program) 2022/04/20 15:27:05 fetching corpus: 1170, signal 229352/256216 (executing program) 2022/04/20 15:27:05 fetching corpus: 1218, signal 232828/260443 (executing program) 2022/04/20 15:27:06 fetching corpus: 1265, signal 237620/265781 (executing program) 2022/04/20 15:27:06 fetching corpus: 1313, signal 240763/269676 (executing program) 2022/04/20 15:27:06 fetching corpus: 1359, signal 244729/274209 (executing program) 2022/04/20 15:27:07 fetching corpus: 1407, signal 248590/278664 (executing program) 2022/04/20 15:27:07 fetching corpus: 1457, signal 252959/283505 (executing program) 2022/04/20 15:27:07 fetching corpus: 1506, signal 256354/287426 (executing program) 2022/04/20 15:27:07 fetching corpus: 1555, signal 259446/291098 (executing program) 2022/04/20 15:27:08 fetching corpus: 1604, signal 261529/293868 (executing program) 2022/04/20 15:27:08 fetching corpus: 1654, signal 264543/297344 (executing program) 2022/04/20 15:27:08 fetching corpus: 1702, signal 267404/300722 (executing program) 2022/04/20 15:27:09 fetching corpus: 1752, signal 269971/303849 (executing program) 2022/04/20 15:27:09 fetching corpus: 1799, signal 273645/307878 (executing program) 2022/04/20 15:27:09 fetching corpus: 1848, signal 276113/310859 (executing program) 2022/04/20 15:27:09 fetching corpus: 1895, signal 279368/314488 (executing program) 2022/04/20 15:27:10 fetching corpus: 1943, signal 281985/317599 (executing program) 2022/04/20 15:27:10 fetching corpus: 1992, signal 283989/320152 (executing program) 2022/04/20 15:27:10 fetching corpus: 2040, signal 286434/323067 (executing program) 2022/04/20 15:27:10 fetching corpus: 2087, signal 288172/325340 (executing program) 2022/04/20 15:27:11 fetching corpus: 2137, signal 291736/329130 (executing program) 2022/04/20 15:27:11 fetching corpus: 2185, signal 294000/331836 (executing program) 2022/04/20 15:27:11 fetching corpus: 2232, signal 296055/334321 (executing program) 2022/04/20 15:27:11 fetching corpus: 2280, signal 298944/337509 (executing program) 2022/04/20 15:27:11 fetching corpus: 2330, signal 301587/340409 (executing program) 2022/04/20 15:27:12 fetching corpus: 2378, signal 304476/343506 (executing program) 2022/04/20 15:27:12 fetching corpus: 2426, signal 306757/346180 (executing program) 2022/04/20 15:27:12 fetching corpus: 2476, signal 308733/348528 (executing program) 2022/04/20 15:27:12 fetching corpus: 2526, signal 311182/351230 (executing program) 2022/04/20 15:27:13 fetching corpus: 2575, signal 312806/353296 (executing program) 2022/04/20 15:27:13 fetching corpus: 2623, signal 315124/355854 (executing program) 2022/04/20 15:27:13 fetching corpus: 2673, signal 316970/358076 (executing program) 2022/04/20 15:27:13 fetching corpus: 2723, signal 319121/360502 (executing program) 2022/04/20 15:27:14 fetching corpus: 2770, signal 321577/363168 (executing program) 2022/04/20 15:27:14 fetching corpus: 2819, signal 323650/365459 (executing program) 2022/04/20 15:27:14 fetching corpus: 2869, signal 325521/367634 (executing program) 2022/04/20 15:27:14 fetching corpus: 2917, signal 327527/369867 (executing program) 2022/04/20 15:27:15 fetching corpus: 2967, signal 329633/372178 (executing program) 2022/04/20 15:27:15 fetching corpus: 3017, signal 331820/374497 (executing program) 2022/04/20 15:27:15 fetching corpus: 3067, signal 333318/376269 (executing program) 2022/04/20 15:27:15 fetching corpus: 3117, signal 335059/378199 (executing program) 2022/04/20 15:27:16 fetching corpus: 3167, signal 336596/379994 (executing program) 2022/04/20 15:27:16 fetching corpus: 3217, signal 338846/382263 (executing program) 2022/04/20 15:27:17 fetching corpus: 3267, signal 340569/384149 (executing program) 2022/04/20 15:27:17 fetching corpus: 3317, signal 342149/385978 (executing program) 2022/04/20 15:27:17 fetching corpus: 3365, signal 343894/387856 (executing program) 2022/04/20 15:27:18 fetching corpus: 3415, signal 345567/389654 (executing program) 2022/04/20 15:27:18 fetching corpus: 3465, signal 347317/391499 (executing program) 2022/04/20 15:27:18 fetching corpus: 3515, signal 348943/393190 (executing program) 2022/04/20 15:27:18 fetching corpus: 3565, signal 350087/394608 (executing program) 2022/04/20 15:27:19 fetching corpus: 3615, signal 351839/396432 (executing program) 2022/04/20 15:27:19 fetching corpus: 3665, signal 353913/398466 (executing program) 2022/04/20 15:27:19 fetching corpus: 3715, signal 355418/400073 (executing program) 2022/04/20 15:27:20 fetching corpus: 3765, signal 356953/401712 (executing program) 2022/04/20 15:27:20 fetching corpus: 3815, signal 358432/403328 (executing program) 2022/04/20 15:27:20 fetching corpus: 3865, signal 359805/404840 (executing program) 2022/04/20 15:27:21 fetching corpus: 3915, signal 361408/406546 (executing program) 2022/04/20 15:27:21 fetching corpus: 3965, signal 363004/408179 (executing program) 2022/04/20 15:27:21 fetching corpus: 4015, signal 364789/409950 (executing program) 2022/04/20 15:27:21 fetching corpus: 4065, signal 367008/411972 (executing program) 2022/04/20 15:27:22 fetching corpus: 4115, signal 368782/413658 (executing program) 2022/04/20 15:27:22 fetching corpus: 4165, signal 370384/415248 (executing program) 2022/04/20 15:27:22 fetching corpus: 4215, signal 371709/416649 (executing program) 2022/04/20 15:27:23 fetching corpus: 4265, signal 373143/418055 (executing program) 2022/04/20 15:27:23 fetching corpus: 4315, signal 374537/419461 (executing program) 2022/04/20 15:27:23 fetching corpus: 4365, signal 375857/420764 (executing program) 2022/04/20 15:27:23 fetching corpus: 4415, signal 377416/422204 (executing program) 2022/04/20 15:27:24 fetching corpus: 4465, signal 378990/423709 (executing program) 2022/04/20 15:27:24 fetching corpus: 4514, signal 380232/424977 (executing program) 2022/04/20 15:27:24 fetching corpus: 4564, signal 381766/426434 (executing program) 2022/04/20 15:27:25 fetching corpus: 4614, signal 382766/427535 (executing program) 2022/04/20 15:27:25 fetching corpus: 4664, signal 384035/428787 (executing program) 2022/04/20 15:27:25 fetching corpus: 4714, signal 385507/430157 (executing program) 2022/04/20 15:27:25 fetching corpus: 4764, signal 386769/431414 (executing program) 2022/04/20 15:27:26 fetching corpus: 4814, signal 388004/432613 (executing program) 2022/04/20 15:27:26 fetching corpus: 4863, signal 389292/433833 (executing program) 2022/04/20 15:27:26 fetching corpus: 4913, signal 390241/434855 (executing program) 2022/04/20 15:27:26 fetching corpus: 4963, signal 391470/436053 (executing program) 2022/04/20 15:27:27 fetching corpus: 5013, signal 392795/437300 (executing program) 2022/04/20 15:27:27 fetching corpus: 5062, signal 394303/438583 (executing program) 2022/04/20 15:27:27 fetching corpus: 5112, signal 395181/439545 (executing program) 2022/04/20 15:27:28 fetching corpus: 5160, signal 397014/441062 (executing program) 2022/04/20 15:27:28 fetching corpus: 5210, signal 398544/442376 (executing program) 2022/04/20 15:27:28 fetching corpus: 5258, signal 399499/443327 (executing program) 2022/04/20 15:27:29 fetching corpus: 5308, signal 400629/444388 (executing program) 2022/04/20 15:27:29 fetching corpus: 5358, signal 401698/445371 (executing program) 2022/04/20 15:27:29 fetching corpus: 5408, signal 402814/446331 (executing program) 2022/04/20 15:27:29 fetching corpus: 5457, signal 403811/447320 (executing program) 2022/04/20 15:27:30 fetching corpus: 5505, signal 404997/448393 (executing program) 2022/04/20 15:27:30 fetching corpus: 5553, signal 406062/449364 (executing program) 2022/04/20 15:27:30 fetching corpus: 5603, signal 407548/450590 (executing program) 2022/04/20 15:27:31 fetching corpus: 5653, signal 408417/451414 (executing program) 2022/04/20 15:27:31 fetching corpus: 5702, signal 409145/452141 (executing program) 2022/04/20 15:27:31 fetching corpus: 5752, signal 410069/453003 (executing program) 2022/04/20 15:27:31 fetching corpus: 5802, signal 411247/453974 (executing program) 2022/04/20 15:27:32 fetching corpus: 5852, signal 412916/455181 (executing program) 2022/04/20 15:27:32 fetching corpus: 5902, signal 413995/456087 (executing program) 2022/04/20 15:27:32 fetching corpus: 5952, signal 415168/457046 (executing program) 2022/04/20 15:27:33 fetching corpus: 6000, signal 415919/457768 (executing program) 2022/04/20 15:27:33 fetching corpus: 6049, signal 416968/458686 (executing program) 2022/04/20 15:27:33 fetching corpus: 6098, signal 418488/459793 (executing program) 2022/04/20 15:27:33 fetching corpus: 6148, signal 419534/460646 (executing program) 2022/04/20 15:27:34 fetching corpus: 6197, signal 420484/461420 (executing program) 2022/04/20 15:27:34 fetching corpus: 6247, signal 421480/462216 (executing program) 2022/04/20 15:27:34 fetching corpus: 6297, signal 422371/462927 (executing program) 2022/04/20 15:27:34 fetching corpus: 6347, signal 423517/463786 (executing program) 2022/04/20 15:27:35 fetching corpus: 6397, signal 424630/464639 (executing program) 2022/04/20 15:27:35 fetching corpus: 6447, signal 425616/465394 (executing program) 2022/04/20 15:27:35 fetching corpus: 6497, signal 426852/466294 (executing program) 2022/04/20 15:27:36 fetching corpus: 6547, signal 427559/466934 (executing program) 2022/04/20 15:27:36 fetching corpus: 6597, signal 428473/467692 (executing program) 2022/04/20 15:27:36 fetching corpus: 6647, signal 429268/468376 (executing program) 2022/04/20 15:27:36 fetching corpus: 6697, signal 430061/468990 (executing program) 2022/04/20 15:27:37 fetching corpus: 6747, signal 431015/469703 (executing program) 2022/04/20 15:27:37 fetching corpus: 6797, signal 431968/470410 (executing program) 2022/04/20 15:27:37 fetching corpus: 6847, signal 433178/471187 (executing program) 2022/04/20 15:27:37 fetching corpus: 6897, signal 434420/471985 (executing program) 2022/04/20 15:27:38 fetching corpus: 6945, signal 435920/472862 (executing program) 2022/04/20 15:27:38 fetching corpus: 6994, signal 436867/473516 (executing program) 2022/04/20 15:27:38 fetching corpus: 7044, signal 437768/474171 (executing program) 2022/04/20 15:27:39 fetching corpus: 7094, signal 438241/474617 (executing program) 2022/04/20 15:27:39 fetching corpus: 7144, signal 439109/475226 (executing program) 2022/04/20 15:27:39 fetching corpus: 7194, signal 440002/475850 (executing program) 2022/04/20 15:27:39 fetching corpus: 7244, signal 440832/476416 (executing program) 2022/04/20 15:27:39 fetching corpus: 7294, signal 441940/477073 (executing program) 2022/04/20 15:27:40 fetching corpus: 7344, signal 442928/477676 (executing program) 2022/04/20 15:27:40 fetching corpus: 7394, signal 443991/478329 (executing program) 2022/04/20 15:27:40 fetching corpus: 7444, signal 444959/478974 (executing program) 2022/04/20 15:27:41 fetching corpus: 7494, signal 445968/479624 (executing program) 2022/04/20 15:27:41 fetching corpus: 7544, signal 446948/480256 (executing program) 2022/04/20 15:27:41 fetching corpus: 7594, signal 447668/480749 (executing program) 2022/04/20 15:27:41 fetching corpus: 7644, signal 448560/481326 (executing program) 2022/04/20 15:27:41 fetching corpus: 7694, signal 449592/481894 (executing program) 2022/04/20 15:27:42 fetching corpus: 7744, signal 450155/482304 (executing program) 2022/04/20 15:27:42 fetching corpus: 7793, signal 450924/482767 (executing program) 2022/04/20 15:27:42 fetching corpus: 7843, signal 451661/483228 (executing program) 2022/04/20 15:27:43 fetching corpus: 7893, signal 452358/483697 (executing program) 2022/04/20 15:27:43 fetching corpus: 7943, signal 453201/484195 (executing program) 2022/04/20 15:27:43 fetching corpus: 7993, signal 454057/484701 (executing program) 2022/04/20 15:27:43 fetching corpus: 8043, signal 454646/485094 (executing program) 2022/04/20 15:27:44 fetching corpus: 8090, signal 455376/485516 (executing program) 2022/04/20 15:27:44 fetching corpus: 8136, signal 456112/485987 (executing program) 2022/04/20 15:27:44 fetching corpus: 8186, signal 457276/486537 (executing program) 2022/04/20 15:27:44 fetching corpus: 8236, signal 458096/487013 (executing program) 2022/04/20 15:27:45 fetching corpus: 8286, signal 459197/487534 (executing program) 2022/04/20 15:27:45 fetching corpus: 8336, signal 459778/487886 (executing program) 2022/04/20 15:27:45 fetching corpus: 8385, signal 460572/488291 (executing program) 2022/04/20 15:27:46 fetching corpus: 8435, signal 461606/488768 (executing program) 2022/04/20 15:27:46 fetching corpus: 8485, signal 462307/489135 (executing program) 2022/04/20 15:27:46 fetching corpus: 8535, signal 463367/489592 (executing program) 2022/04/20 15:27:47 fetching corpus: 8585, signal 464040/489947 (executing program) 2022/04/20 15:27:47 fetching corpus: 8634, signal 464733/490336 (executing program) 2022/04/20 15:27:47 fetching corpus: 8683, signal 465613/490755 (executing program) 2022/04/20 15:27:47 fetching corpus: 8730, signal 466234/491072 (executing program) 2022/04/20 15:27:48 fetching corpus: 8780, signal 466990/491412 (executing program) 2022/04/20 15:27:48 fetching corpus: 8830, signal 467771/491755 (executing program) 2022/04/20 15:27:48 fetching corpus: 8878, signal 468296/492038 (executing program) 2022/04/20 15:27:48 fetching corpus: 8927, signal 468999/492400 (executing program) 2022/04/20 15:27:49 fetching corpus: 8976, signal 469891/492764 (executing program) 2022/04/20 15:27:49 fetching corpus: 9026, signal 470722/493151 (executing program) 2022/04/20 15:27:49 fetching corpus: 9074, signal 471282/493446 (executing program) 2022/04/20 15:27:50 fetching corpus: 9124, signal 472667/493969 (executing program) 2022/04/20 15:27:50 fetching corpus: 9173, signal 473254/494239 (executing program) 2022/04/20 15:27:50 fetching corpus: 9222, signal 474122/494595 (executing program) 2022/04/20 15:27:50 fetching corpus: 9271, signal 474580/494799 (executing program) 2022/04/20 15:27:51 fetching corpus: 9320, signal 475299/495078 (executing program) 2022/04/20 15:27:51 fetching corpus: 9369, signal 475951/495394 (executing program) 2022/04/20 15:27:51 fetching corpus: 9418, signal 476590/495673 (executing program) 2022/04/20 15:27:52 fetching corpus: 9466, signal 477297/495976 (executing program) 2022/04/20 15:27:52 fetching corpus: 9516, signal 478065/496254 (executing program) 2022/04/20 15:27:52 fetching corpus: 9566, signal 478779/496506 (executing program) 2022/04/20 15:27:53 fetching corpus: 9616, signal 479455/496747 (executing program) 2022/04/20 15:27:53 fetching corpus: 9666, signal 480185/496985 (executing program) 2022/04/20 15:27:53 fetching corpus: 9716, signal 480690/497185 (executing program) 2022/04/20 15:27:54 fetching corpus: 9766, signal 481371/497413 (executing program) 2022/04/20 15:27:54 fetching corpus: 9816, signal 482020/497642 (executing program) 2022/04/20 15:27:54 fetching corpus: 9866, signal 482835/497882 (executing program) 2022/04/20 15:27:55 fetching corpus: 9916, signal 483750/498147 (executing program) 2022/04/20 15:27:55 fetching corpus: 9966, signal 484466/498381 (executing program) 2022/04/20 15:27:55 fetching corpus: 10016, signal 485137/498560 (executing program) 2022/04/20 15:27:55 fetching corpus: 10066, signal 485721/498736 (executing program) 2022/04/20 15:27:55 fetching corpus: 10116, signal 486602/498942 (executing program) 2022/04/20 15:27:56 fetching corpus: 10166, signal 487358/499121 (executing program) 2022/04/20 15:27:56 fetching corpus: 10216, signal 488006/499285 (executing program) 2022/04/20 15:27:56 fetching corpus: 10266, signal 488684/499452 (executing program) 2022/04/20 15:27:56 fetching corpus: 10316, signal 489432/499629 (executing program) 2022/04/20 15:27:57 fetching corpus: 10366, signal 490023/499802 (executing program) 2022/04/20 15:27:57 fetching corpus: 10416, signal 490832/499975 (executing program) 2022/04/20 15:27:57 fetching corpus: 10466, signal 491336/500091 (executing program) 2022/04/20 15:27:57 fetching corpus: 10516, signal 491939/500229 (executing program) 2022/04/20 15:27:58 fetching corpus: 10566, signal 492396/500350 (executing program) 2022/04/20 15:27:58 fetching corpus: 10616, signal 492943/500451 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500554 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500597 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500632 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500675 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500722 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500749 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500784 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500817 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500864 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500892 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500922 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500965 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/500996 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501022 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501049 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501073 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501099 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501128 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501165 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501199 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501231 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501272 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501320 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501351 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501383 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501406 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501437 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501470 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501505 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501538 (executing program) 2022/04/20 15:27:58 fetching corpus: 10638, signal 493375/501583 (executing program) 2022/04/20 15:27:59 fetching corpus: 10638, signal 493375/501627 (executing program) 2022/04/20 15:27:59 fetching corpus: 10638, signal 493375/501651 (executing program) 2022/04/20 15:27:59 fetching corpus: 10638, signal 493375/501686 (executing program) 2022/04/20 15:27:59 fetching corpus: 10638, signal 493375/501704 (executing program) 2022/04/20 15:27:59 fetching corpus: 10638, signal 493375/501704 (executing program) 2022/04/20 15:28:00 starting 6 fuzzer processes 15:28:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="1802000000000900000000000000000085000000170000009500000000000000e2f28a11945830f1ec36c6a7008000004fc4ced9c0d259ddf588b91e4c90c54892755e4755ebb72db8c60e2ae8676fa700380800c2ba109e637166fc79a5fa07a461fa105183d0d96e9b1d965b7237b9d636d694841dc063e24606576640f4179ee049e3cdf6ff6d5ac49162a1a436b89323f51d0d3b37d08fc57bf0924e7d2071f17fb2d867a6d3b13e57283fc384a32f0b81545c43c15ad36e5191965352f38b4e2f26e940108c29d4032e7f7a32ea3e7b67e23b825cd58d9cd5d0c8ce41ae8df7784529b8a66d2da16f262f2986458a4940f7b10169e556be69f7d4cd39b7f21435bb0de48c12a93d419f736e4323fbab922f33957d70551c747ab722468948ba8934de0a25e8d9bbc1c3afa8886decbe802a8a030000409920dc6f6c9db66862300e0b97000000007be98de5eb47c579f3d1082a5b598667cfda010001000000000055b97234aac346c9b771a9448c654f7bcc3399b342ad60a185baece1d8c04d1791c938bde7411513b759bf81444b351f62243625b8fc5d1d0cd397da31b0d2bf41a1ac0c8cdf4410e757a049382abbe7b9a5fa239af6582c0a659cacdb57d416f60a05000000000000000000ab0cb02b0000000000000006000000000000ae06b4b5784a7c06935389267853c1280694e56161bf3708b527ecfc89f86048560cadc00bcbe92b3b95934977d92568dbc63acda956fb9b50a1c3165a147ab71409ca5adc6b54d4be8cb19d9a42f7437b4589972422f1471724c1b987e608c9e1158798a6c0be55718679838801a1c37a37f4a27d411e137778cb5cea49585e69069e7aa9aebb892a1ca24eee948fd75bfa7e18ba4cdcf170ef58013880bcf6829eae3e8a4ece4b77452ca800000080f198c4a2e952bce69e7cbeaad4404895200e0b395a343c103d79d83457af28639749dbd7d2e91bca942ceea86605ec758be775cc6c000000000000000000000000000000000000000000000000000000000000c73c74fd4d30322cc961c626048dfb6c1be221264aad8e035c4fa5d5b3024a61f312fd28df71412d74c63b6beb2d63010c1570fa8235daf6c3683626eb013e356a89540f12c196532e99897fb20733db867f98d4622c65e58902f8a155db7f4f116e4ef6a79f08000000ae1fd637b6a4cabe84905c794f48dd5e621733e37f6fea903e25ca7125ed199319ec1e9cedff5315bb07f0a6d9d2fe951feebceb319a8952fb4a3b730f1ab9ae04d2e1001e58b53400007aa1f5476a8a8a7f99e711b94384c9033a4014b8c416a58aa8e75fdb34279d21046564e7f02ecea4ae948c240da1df62640253e9ee06a3d831070000000000000035758843f5d1d8f6dc42923fbfd232281ef36047556be0030000000000000096b5ee53644ab7dcc5c322c05f5feb55214c9c34cc166156027f8565a7fbefeb8d3de8c572d6da9dff6039e938cd7a7483fec4b5a3cb89031eb3244e5f926b51f9a1fdeb5c282ccc68c5ef90fe732bc1374ca6ec30f72c80b988f4323b5922c36072625a0f3704ed60dee6fa8929f28b225cc42f8f1fbc432f3183800ab98111f00000000000000000000000000000000000152a25235f8044be6e6c93a4e58fb9c3df8014b729187c33f5e2ac2e36b7e824735d06c20b17a2e19d15b1991ccf9a7e6ac3ffc69222316be6c123afd32a48e9b9b391ecf2710f6aca6089202971823a63000000efd5df6371e0507a1d0a1d11e185c4af9c4d86aaa3015476822a0ca909d2205cee9f9e26b2b660f9c3544000c434c9fe1204000000975aede4658a725d698aebd648a9124bb69ede23b9a7886819eb4c82385c28a54991c061e44fb519e5d24155665b1add6a026e0000000000000000000000615a57e9f3b0e5f7a3a26d365bf349d12455fd39c146c626720006529d803b71560d2da7d39d34fab15f"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) 15:28:00 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000480)=0x10001, 0x4) 15:28:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:00 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) 15:28:00 executing program 3: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 15:28:00 executing program 4: unshare(0x40400) syz_clone(0x20040000, 0x0, 0x0, 0x0, 0x0, 0x0) syzkaller login: [ 90.696779] IPVS: ftp: loaded support on port[0] = 21 [ 90.764773] IPVS: ftp: loaded support on port[0] = 21 [ 90.834855] chnl_net:caif_netlink_parms(): no params data found [ 90.870392] IPVS: ftp: loaded support on port[0] = 21 [ 90.941276] chnl_net:caif_netlink_parms(): no params data found [ 90.992064] IPVS: ftp: loaded support on port[0] = 21 [ 91.086490] chnl_net:caif_netlink_parms(): no params data found [ 91.148183] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.155095] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.163084] device bridge_slave_0 entered promiscuous mode [ 91.173437] IPVS: ftp: loaded support on port[0] = 21 [ 91.191433] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.197861] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.205712] device bridge_slave_0 entered promiscuous mode [ 91.212364] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.218703] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.225825] device bridge_slave_1 entered promiscuous mode [ 91.253003] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.259330] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.266677] device bridge_slave_1 entered promiscuous mode [ 91.307022] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 91.318420] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 91.330601] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 91.394668] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 91.416863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 91.425737] team0: Port device team_slave_0 added [ 91.434242] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.441877] team0: Port device team_slave_1 added [ 91.453926] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.460352] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.467156] device bridge_slave_0 entered promiscuous mode [ 91.477724] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.484190] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.491990] device bridge_slave_1 entered promiscuous mode [ 91.516253] IPVS: ftp: loaded support on port[0] = 21 [ 91.523725] chnl_net:caif_netlink_parms(): no params data found [ 91.542718] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 91.550163] team0: Port device team_slave_0 added [ 91.555610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.563410] team0: Port device team_slave_1 added [ 91.586653] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 91.592930] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.618229] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 91.630908] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 91.637134] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.662993] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 91.679183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 91.687409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 91.696319] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 91.736714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 91.767268] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 91.774178] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.801097] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 91.855618] device hsr_slave_0 entered promiscuous mode [ 91.861361] device hsr_slave_1 entered promiscuous mode [ 91.871905] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 91.878131] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 91.904581] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 91.934588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 91.941901] team0: Port device team_slave_0 added [ 91.947050] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 91.958876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 91.970965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 91.977958] team0: Port device team_slave_1 added [ 91.987179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 92.001264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 92.014739] chnl_net:caif_netlink_parms(): no params data found [ 92.052155] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 92.058389] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.084882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 92.125410] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 92.131776] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.158155] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 92.201648] device hsr_slave_0 entered promiscuous mode [ 92.207286] device hsr_slave_1 entered promiscuous mode [ 92.222308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 92.229509] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.235843] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.243309] device bridge_slave_0 entered promiscuous mode [ 92.252679] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.259011] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.266263] device bridge_slave_1 entered promiscuous mode [ 92.277588] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 92.284737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 92.317545] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 92.384419] device hsr_slave_0 entered promiscuous mode [ 92.390088] device hsr_slave_1 entered promiscuous mode [ 92.396801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 92.444116] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 92.451679] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 92.474725] chnl_net:caif_netlink_parms(): no params data found [ 92.485343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 92.571715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 92.578685] team0: Port device team_slave_0 added [ 92.584867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 92.593195] team0: Port device team_slave_1 added [ 92.617115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 92.632996] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.639441] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.646288] device bridge_slave_0 entered promiscuous mode [ 92.657576] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.664148] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.671444] device bridge_slave_1 entered promiscuous mode [ 92.679961] Bluetooth: hci1 command 0x0409 tx timeout [ 92.679964] Bluetooth: hci2 command 0x0409 tx timeout [ 92.698415] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 92.707166] Bluetooth: hci0 command 0x0409 tx timeout [ 92.713497] Bluetooth: hci5 command 0x0409 tx timeout [ 92.718756] Bluetooth: hci3 command 0x0409 tx timeout [ 92.721266] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 92.725557] Bluetooth: hci4 command 0x0409 tx timeout [ 92.730668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.761071] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 92.792476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 92.801292] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 92.807524] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.833883] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 92.846090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 92.875570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 92.902689] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 92.910150] team0: Port device team_slave_0 added [ 92.918573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 92.926794] team0: Port device team_slave_1 added [ 92.939052] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 92.951352] device hsr_slave_0 entered promiscuous mode [ 92.957072] device hsr_slave_1 entered promiscuous mode [ 92.964742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 92.990247] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 93.010415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.017528] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 93.024017] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.049878] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 93.088512] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 93.098097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.105543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 93.112356] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.137829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 93.148728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 93.155865] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.162379] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.169922] device bridge_slave_0 entered promiscuous mode [ 93.185186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 93.194375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 93.202624] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.208953] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.216103] device bridge_slave_1 entered promiscuous mode [ 93.233718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.241231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.250184] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 93.256269] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.292775] device hsr_slave_0 entered promiscuous mode [ 93.298376] device hsr_slave_1 entered promiscuous mode [ 93.312791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 93.322556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 93.335326] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 93.345239] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 93.353084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.360902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.368605] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.375030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.382388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.404346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.418362] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 93.434068] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 93.455344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.463826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.472557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.480619] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.486957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.495389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 93.508579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.516839] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 93.524361] team0: Port device team_slave_0 added [ 93.533092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 93.561267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 93.568320] team0: Port device team_slave_1 added [ 93.574342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.581476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.622243] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 93.628312] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.638927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 93.651791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 93.658029] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.684373] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 93.696570] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 93.703235] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 93.728945] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 93.740882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 93.748339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 93.762290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.785271] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 93.807109] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 93.820768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.831811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.839809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.847334] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.853730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.863198] device hsr_slave_0 entered promiscuous mode [ 93.868807] device hsr_slave_1 entered promiscuous mode [ 93.876614] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 93.884592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 93.898265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 93.908311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.915572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.924156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.932080] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.938403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.945581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 93.953721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.961687] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 93.968790] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 93.977881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 93.986828] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 94.002654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.010989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.018506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.026155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.033002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.049778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 94.058190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 94.070327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 94.076380] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.082996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.090501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.097875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.128803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 94.153500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.163016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 94.172102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.179914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 94.192226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 94.205132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.213294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.222001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.230100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.237566] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.243942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.251551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.258911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.268379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 94.277227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.285072] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 94.291240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.304860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.312460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.320595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.327508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.335670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.343442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.351811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.359893] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.366220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.374745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 94.383702] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 94.401950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.411055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.422067] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 94.430703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.438088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.450036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 94.461751] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 94.467942] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.477184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.485663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 94.493165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.500449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.507184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.515299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.522997] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.529383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.536331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.544317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.558065] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 94.566094] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 94.580563] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 94.586553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.597388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.606341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 94.613563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 94.620687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.628317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.636103] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.642483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.650115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 94.662022] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 94.670435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 94.678043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 94.685664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.693669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.701472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.708868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 94.716686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.727990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.741557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 94.749409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.756961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.765278] Bluetooth: hci1 command 0x041b tx timeout [ 94.766724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 94.778355] Bluetooth: hci4 command 0x041b tx timeout [ 94.783819] Bluetooth: hci3 command 0x041b tx timeout [ 94.789427] Bluetooth: hci5 command 0x041b tx timeout [ 94.797914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 94.804947] Bluetooth: hci0 command 0x041b tx timeout [ 94.807759] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 94.810666] Bluetooth: hci2 command 0x041b tx timeout [ 94.822539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 94.830799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.838158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.848155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 94.857432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.866317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 94.876270] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 94.884739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 94.892765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 94.901069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.908461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.915968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 94.922902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 94.931626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 94.942247] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 94.950874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 94.960640] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.967706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 94.977116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.985110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.992351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.001116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 95.009227] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 95.015223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.026185] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.035240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 95.044861] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.051749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.064761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.074071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 95.087372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 95.098519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 95.107204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.115391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.123198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.131565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.139646] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.145996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.152921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.161478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.169297] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.175640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.182698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.201418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.210620] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 95.222078] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 95.231390] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 95.243399] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 95.251177] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 95.257191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.271420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 95.278728] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 95.289818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.296503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.305059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 95.312985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.321276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 95.328844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.335570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.346238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.357418] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 95.367440] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 95.375004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.383184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.391459] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 95.404392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 95.413508] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 95.427959] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 95.435885] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 95.443495] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 95.450147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 95.457697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 95.465823] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.472571] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.481394] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 95.488358] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 95.499786] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.512426] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 95.521974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 95.533093] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 95.541586] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.547729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.555426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.562863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 95.570544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.577810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.585786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.593618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.600822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.608803] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 95.620770] device veth0_vlan entered promiscuous mode [ 95.630196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 95.643688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.669483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 95.677704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 95.691522] device veth1_vlan entered promiscuous mode [ 95.702560] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 95.711818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.722369] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 95.728373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 95.736142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 95.745229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.752793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.760450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 95.768051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.775843] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.782225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.789452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.798557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 95.809326] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 95.819698] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 95.834603] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 95.842131] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 95.849942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.857627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.865482] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.871889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.881637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 95.892349] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 95.899831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 95.907717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 95.914658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 95.922675] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 95.934173] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 95.944106] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 95.953547] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 95.963348] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 95.970894] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 95.979250] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 95.987977] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 95.999498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.007304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.015296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.024735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.032567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.042880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 96.052000] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 96.060666] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 96.070493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.078280] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.086032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.093437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.101200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.108676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.118512] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.127360] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.138407] device veth0_vlan entered promiscuous mode [ 96.145591] device veth0_macvtap entered promiscuous mode [ 96.152120] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 96.159490] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.167027] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.174782] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.181816] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.188854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.196434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.206680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 96.224937] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 96.232322] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 96.238833] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 96.247236] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 96.255482] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 96.262382] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 96.268678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.276423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.285584] device veth1_vlan entered promiscuous mode [ 96.299395] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 96.308993] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 96.316137] device veth1_macvtap entered promiscuous mode [ 96.324788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 96.334978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.342369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.350325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 96.357519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.365448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 96.373088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.381706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.388471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.395645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.402979] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.415072] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 96.423964] device veth0_vlan entered promiscuous mode [ 96.437762] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 96.444385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 96.458792] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 96.469746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 96.478175] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 96.487722] device veth0_macvtap entered promiscuous mode [ 96.494809] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 96.501404] device veth0_vlan entered promiscuous mode [ 96.509243] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 96.517158] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 96.525027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.532710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.540788] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 96.547483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 96.554605] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 96.564094] device veth1_macvtap entered promiscuous mode [ 96.570719] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 96.579264] device veth1_vlan entered promiscuous mode [ 96.585141] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 96.596969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 96.605333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 96.616835] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 96.626477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 96.636108] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 96.672452] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 96.680712] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 96.687928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.696366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 96.704454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.713110] device veth1_vlan entered promiscuous mode [ 96.719581] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 96.728674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 96.746686] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 96.753852] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 96.766488] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 96.777764] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 96.785274] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 96.791996] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 96.799340] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 96.806437] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 96.814006] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.822073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.832150] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 96.839735] Bluetooth: hci0 command 0x040f tx timeout [ 96.839874] Bluetooth: hci4 command 0x040f tx timeout [ 96.846191] Bluetooth: hci5 command 0x040f tx timeout [ 96.850356] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 96.862016] Bluetooth: hci3 command 0x040f tx timeout [ 96.867557] Bluetooth: hci1 command 0x040f tx timeout [ 96.868649] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 96.885999] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 96.895233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 96.905633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 96.915773] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 96.923539] Bluetooth: hci2 command 0x040f tx timeout [ 96.929344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 96.937100] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.945377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.953249] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.960996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.976763] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 96.985994] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 96.994416] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 97.005222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.013221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.021119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.028598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.036920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.044272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.051947] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.062258] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.070831] device veth0_macvtap entered promiscuous mode [ 97.077066] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 97.084850] device veth0_vlan entered promiscuous mode [ 97.090865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.101247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.111359] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 97.118213] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.126256] device veth0_macvtap entered promiscuous mode [ 97.133503] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 97.145330] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 97.154794] device veth1_macvtap entered promiscuous mode [ 97.162065] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 97.173314] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.181077] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.188041] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.196054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.204298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.219604] device veth1_macvtap entered promiscuous mode [ 97.230665] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 97.238029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.251868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.261036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 97.274213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 97.282542] device veth1_vlan entered promiscuous mode [ 97.303128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 97.311965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.323488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.333331] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.343243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.353182] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 97.360512] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.370767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.378443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.401747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 97.418124] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 97.425396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.436893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.447198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.457055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.466982] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 97.474553] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.485150] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 97.493256] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 97.500182] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 97.508352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.520557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.536334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.547110] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.556607] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.568353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.577542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.587483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.597804] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 97.605039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 97.613718] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 97.622159] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 97.631799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.640745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.648569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.656583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.664403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.672205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.680624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.691172] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.700502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.710300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.719750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 97.729697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.739923] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 97.746773] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 97.755638] device veth0_vlan entered promiscuous mode [ 97.763838] device veth0_macvtap entered promiscuous mode [ 97.771138] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 97.777740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 97.786529] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.794331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.801646] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.809654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.823719] device veth1_vlan entered promiscuous mode [ 97.830350] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 97.839014] device veth1_macvtap entered promiscuous mode [ 97.845305] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 97.858258] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 97.885804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 97.908383] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 97.921778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 97.948367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 15:28:09 executing program 4: unshare(0x40400) syz_clone(0x20040000, 0x0, 0x0, 0x0, 0x0, 0x0) 15:28:09 executing program 4: unshare(0x40400) syz_clone(0x20040000, 0x0, 0x0, 0x0, 0x0, 0x0) 15:28:09 executing program 4: unshare(0x40400) syz_clone(0x20040000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 97.971778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 97.981278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 97.991577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.001304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.012743] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.034103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.056770] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.067649] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready 15:28:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) [ 98.096340] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.113019] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 98.123510] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 98.132700] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 98.145239] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 98.155212] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 98.163993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 98.172257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 98.181381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 98.192235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.203150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.299409] audit: type=1804 audit(1650468489.313:2): pid=9384 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir1638245498/syzkaller.UMz2IQ/4/bus" dev="sda1" ino=13882 res=1 [ 98.648590] audit: type=1800 audit(1650468489.313:3): pid=9384 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13882 res=0 [ 98.655769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.678311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.687708] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.697509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.706700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 98.716454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.727053] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 98.734416] batman_adv: batadv0: Interface activated: batadv_slave_1 15:28:09 executing program 3: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 98.742632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.751182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.769510] device veth0_macvtap entered promiscuous mode [ 98.788597] device veth1_macvtap entered promiscuous mode [ 98.817113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 15:28:09 executing program 3: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 98.871193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 98.896186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.913282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.923877] Bluetooth: hci1 command 0x0419 tx timeout [ 98.929213] Bluetooth: hci4 command 0x0419 tx timeout [ 98.937063] Bluetooth: hci3 command 0x0419 tx timeout [ 98.942174] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 98.950950] Bluetooth: hci5 command 0x0419 tx timeout [ 98.963364] Bluetooth: hci0 command 0x0419 tx timeout [ 98.987822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 98.999047] Bluetooth: hci2 command 0x0419 tx timeout [ 99.006092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.015940] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.025122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.034881] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.044296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 99.054033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.064609] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 99.071909] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.085189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.093301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.114388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.129168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.143230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.153005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.163004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.172791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.182196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.191922] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.201083] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 99.210857] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 99.221040] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 99.227905] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.243029] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.253199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:28:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) 15:28:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) [ 99.468573] hrtimer: interrupt took 42351 ns [ 99.585948] audit: type=1804 audit(1650468490.614:4): pid=9489 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir1638245498/syzkaller.UMz2IQ/5/bus" dev="sda1" ino=13904 res=1 [ 99.945660] audit: type=1800 audit(1650468490.614:5): pid=9489 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13904 res=0 15:28:11 executing program 3: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 100.041950] syz-executor.2 (9481) used greatest stack depth: 24168 bytes left 15:28:11 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) 15:28:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) 15:28:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c0415cf968000053c0040000ed815cf964000053c30d000066696c652e636f6c64000000ed415cf928000053420b000066696c6530000000ed815cf90a0000534214000066696c6531000000ed815cf928230053c215000066696c6532000000ed815cf928230053c215000066696c6533000000ed815cf91a040053420f000066696c6530000000ffa15cf9260000534211000066696c6531000000f4000000789c2baeacca4eccc9492d2aa61d030085492b1f13010000789c2baeacca", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) [ 100.403459] audit: type=1804 audit(1650468491.434:6): pid=9545 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir1407598496/syzkaller.M55aJK/1/bus" dev="sda1" ino=13889 res=1 15:28:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c0415cf968000053c0040000ed815cf964000053c30d000066696c652e636f6c64000000ed415cf928000053420b000066696c6530000000ed815cf90a0000534214000066696c6531000000ed815cf928230053c215000066696c6532000000ed815cf928230053c215000066696c6533000000ed815cf91a040053420f000066696c6530000000ffa15cf9260000534211000066696c6531000000f4000000789c2baeacca4eccc9492d2aa61d030085492b1f13010000789c2baeacca", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) [ 100.845194] audit: type=1800 audit(1650468491.434:7): pid=9545 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=13889 res=0 15:28:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) 15:28:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:12 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 101.382592] audit: type=1804 audit(1650468491.964:8): pid=9567 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir1638245498/syzkaller.UMz2IQ/6/bus" dev="sda1" ino=13896 res=1 15:28:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 102.190288] cramfs: Error -3 while decompressing! [ 102.203467] audit: type=1800 audit(1650468491.964:9): pid=9567 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="sda1" ino=13896 res=0 [ 102.245754] audit: type=1804 audit(1650468493.214:10): pid=9584 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir1407598496/syzkaller.M55aJK/2/bus" dev="sda1" ino=13925 res=1 [ 102.255056] cramfs: ffffffff8bf43f78(27)->ffff8880728be000(4096) [ 102.283200] audit: type=1800 audit(1650468493.214:11): pid=9584 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=13925 res=0 15:28:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c0415cf968000053c0040000ed815cf964000053c30d000066696c652e636f6c64000000ed415cf928000053420b000066696c6530000000ed815cf90a0000534214000066696c6531000000ed815cf928230053c215000066696c6532000000ed815cf928230053c215000066696c6533000000ed815cf91a040053420f000066696c6530000000ffa15cf9260000534211000066696c6531000000f4000000789c2baeacca4eccc9492d2aa61d030085492b1f13010000789c2baeacca", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) [ 103.074115] cramfs: Error -3 while decompressing! [ 103.095949] cramfs: ffffffff8bf43f78(27)->ffff8880728be000(4096) 15:28:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) 15:28:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:14 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 103.316236] kauditd_printk_skb: 4 callbacks suppressed [ 103.316305] audit: type=1804 audit(1650468494.344:16): pid=9615 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir1407598496/syzkaller.M55aJK/3/bus" dev="sda1" ino=13907 res=1 [ 103.394623] audit: type=1800 audit(1650468494.344:17): pid=9615 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="sda1" ino=13907 res=0 15:28:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) 15:28:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 103.889038] cramfs: Error -3 while decompressing! [ 103.893989] cramfs: ffffffff8bf43f78(27)->ffff88806e014000(4096) [ 103.962286] cramfs: Error -3 while decompressing! 15:28:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) [ 104.003412] cramfs: ffffffff8bf43f78(27)->ffff88806e014000(4096) [ 104.066246] audit: type=1800 audit(1650468495.104:18): pid=9625 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="loop2" ino=244 res=0 15:28:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) [ 104.217278] cramfs: Error -3 while decompressing! 15:28:15 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 104.240676] cramfs: ffffffff8bf47f78(27)->ffff8880724e3000(4096) [ 104.267389] cramfs: Error -3 while decompressing! [ 104.298991] cramfs: ffffffff8bf47f78(27)->ffff8880724e3000(4096) 15:28:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) [ 104.354122] audit: type=1800 audit(1650468495.394:19): pid=9638 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.5" name="file0" dev="loop5" ino=244 res=0 15:28:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) 15:28:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="54a2e72c79ee0e93fdacdfc36de4", 0x0, 0x63b}, 0x28) [ 104.953281] audit: type=1804 audit(1650468495.564:20): pid=9657 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3033896980/syzkaller.x30FHY/4/bus" dev="sda1" ino=13891 res=1 15:28:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 105.091007] audit: type=1800 audit(1650468495.564:21): pid=9657 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=13891 res=0 [ 105.118475] cramfs: Error -3 while decompressing! [ 105.165003] cramfs: ffffffff8bf43f78(27)->ffff8880729dd000(4096) [ 105.199019] cramfs: Error -3 while decompressing! 15:28:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) [ 105.258760] cramfs: ffffffff8bf43f78(27)->ffff8880729dd000(4096) [ 105.303864] audit: type=1800 audit(1650468496.344:22): pid=9661 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.5" name="file0" dev="loop5" ino=244 res=0 15:28:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000040), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0x7f, 0x0, 0x6, 0x5, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x7, 0xfff, 0x1, 0xc385, 0x2e9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c0415cf968000053c0040000ed815cf964000053c30d000066696c652e636f6c64000000ed415cf928000053420b000066696c6530000000ed815cf90a0000534214000066696c6531000000ed815cf928230053c215000066696c6532000000ed815cf928230053c215000066696c6533000000ed815cf91a040053420f000066696c6530000000ffa15cf9260000534211000066696c6531000000f4000000789c2baeacca4eccc9492d2aa61d030085492b1f13010000789c2baeacca", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2100, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r3 = dup2(r1, r2) recvmmsg$unix(r3, &(0x7f0000001640)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000380)=""/116, 0x74}, {0x0}, {0x0}, {0x0}], 0x4}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f00000012c0)=[{0x0}, {0x0}, {&(0x7f0000000ec0)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}], 0x6, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001440), 0x6e, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/93, 0x5d}, {&(0x7f0000001540)=""/77, 0x4d}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}], 0x20}}], 0x3, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 15:28:16 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 105.865606] audit: type=1804 audit(1650468496.454:23): pid=9681 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir103006123/syzkaller.cIRLdW/7/bus" dev="sda1" ino=13944 res=1 15:28:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 106.125291] audit: type=1800 audit(1650468496.454:24): pid=9681 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=13944 res=0 [ 106.143342] cramfs: Error -3 while decompressing! 15:28:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:17 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) [ 106.166427] cramfs: ffffffff8bf47f78(27)->ffff88806e07b000(4096) [ 106.210893] cramfs: Error -3 while decompressing! 15:28:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x1b, r1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000380)=ANY=[], 0x44) sendfile(r3, r3, &(0x7f0000000700), 0x7fff) [ 106.235884] cramfs: ffffffff8bf47f78(27)->ffff88806e07b000(4096) [ 106.772209] audit: type=1804 audit(1650468496.954:25): pid=9687 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3033896980/syzkaller.x30FHY/5/bus" dev="sda1" ino=13902 res=1 15:28:17 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000640)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 15:28:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:18 executing program 0: mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012000)="04", 0x1, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x57d, 0x9000}, {&(0x7f0000000140)="00000000000000000100000000000000000000000000000000000000000000000000000000000000085a2206afea54eaef", 0x31, 0x9c00}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r4, 0x0) fchown(r1, 0xee01, r4) [ 107.711663] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 15:28:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x3) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ftruncate(r3, 0x800) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r3, 0x200, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) 15:28:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 0: mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012000)="04", 0x1, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x57d, 0x9000}, {&(0x7f0000000140)="00000000000000000100000000000000000000000000000000000000000000000000000000000000085a2206afea54eaef", 0x31, 0x9c00}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r4, 0x0) fchown(r1, 0xee01, r4) 15:28:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) 15:28:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x3) listen(r0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2, 0x1f}, 0x8) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) [ 108.495596] overlayfs: unrecognized mount option "xino=auto" or missing value [ 108.623843] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 15:28:19 executing program 0: mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012000)="04", 0x1, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x57d, 0x9000}, {&(0x7f0000000140)="00000000000000000100000000000000000000000000000000000000000000000000000000000000085a2206afea54eaef", 0x31, 0x9c00}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r4, 0x0) fchown(r1, 0xee01, r4) 15:28:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:19 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:19 executing program 3: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) unshare(0x40600) pwrite64(r0, 0x0, 0x0, 0x0) 15:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) [ 108.756421] overlayfs: unrecognized mount option "xino=auto" or missing value [ 108.756964] [ 108.765338] ====================================================== [ 108.771642] WARNING: possible circular locking dependency detected [ 108.777947] 4.14.276-syzkaller #0 Not tainted [ 108.782423] ------------------------------------------------------ [ 108.788723] syz-executor.4/9814 is trying to acquire lock: [ 108.794329] (sb_writers#6){.+.+}, at: [] vfs_fallocate+0x5c1/0x790 [ 108.802304] [ 108.802304] but task is already holding lock: [ 108.808260] (ashmem_mutex){+.+.}, at: [] ashmem_ioctl+0x27e/0xd00 [ 108.816160] [ 108.816160] which lock already depends on the new lock. [ 108.816160] [ 108.824465] [ 108.824465] the existing dependency chain (in reverse order) is: [ 108.832068] [ 108.832068] -> #3 (ashmem_mutex){+.+.}: [ 108.837529] __mutex_lock+0xc4/0x1310 [ 108.841841] ashmem_mmap+0x50/0x5c0 [ 108.845974] mmap_region+0xa1a/0x1220 [ 108.850280] do_mmap+0x5b3/0xcb0 [ 108.854153] vm_mmap_pgoff+0x14e/0x1a0 [ 108.858546] SyS_mmap_pgoff+0x249/0x510 [ 108.863027] do_syscall_64+0x1d5/0x640 [ 108.867427] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 108.873120] [ 108.873120] -> #2 (&mm->mmap_sem){++++}: [ 108.878656] __might_fault+0x137/0x1b0 [ 108.883050] _copy_to_user+0x27/0xd0 [ 108.887268] filldir+0x1d5/0x390 [ 108.891138] dcache_readdir+0x180/0x860 [ 108.895615] iterate_dir+0x1a0/0x5e0 [ 108.899835] SyS_getdents+0x125/0x240 [ 108.904143] do_syscall_64+0x1d5/0x640 [ 108.908534] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 108.914222] [ 108.914222] -> #1 (&type->i_mutex_dir_key#5){++++}: [ 108.920713] down_write+0x34/0x90 [ 108.924674] path_openat+0xde2/0x2970 [ 108.928978] do_filp_open+0x179/0x3c0 [ 108.933282] do_sys_open+0x296/0x410 [ 108.937498] do_syscall_64+0x1d5/0x640 [ 108.941888] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 108.947580] [ 108.947580] -> #0 (sb_writers#6){.+.+}: [ 108.953028] lock_acquire+0x170/0x3f0 [ 108.957335] __sb_start_write+0x64/0x260 [ 108.961903] vfs_fallocate+0x5c1/0x790 [ 108.966318] ashmem_shrink_scan.part.0+0x135/0x3d0 [ 108.971768] ashmem_ioctl+0x294/0xd00 [ 108.976093] do_vfs_ioctl+0x75a/0xff0 [ 108.980403] SyS_ioctl+0x7f/0xb0 [ 108.984286] do_syscall_64+0x1d5/0x640 [ 108.988689] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 108.994388] [ 108.994388] other info that might help us debug this: [ 108.994388] [ 109.002521] Chain exists of: [ 109.002521] sb_writers#6 --> &mm->mmap_sem --> ashmem_mutex [ 109.002521] [ 109.012754] Possible unsafe locking scenario: [ 109.012754] [ 109.018798] CPU0 CPU1 [ 109.023446] ---- ---- [ 109.028099] lock(ashmem_mutex); [ 109.031540] lock(&mm->mmap_sem); [ 109.037584] lock(ashmem_mutex); [ 109.043543] lock(sb_writers#6); [ 109.046984] [ 109.046984] *** DEADLOCK *** [ 109.046984] [ 109.053034] 1 lock held by syz-executor.4/9814: [ 109.057685] #0: (ashmem_mutex){+.+.}, at: [] ashmem_ioctl+0x27e/0xd00 [ 109.066006] [ 109.066006] stack backtrace: [ 109.070492] CPU: 0 PID: 9814 Comm: syz-executor.4 Not tainted 4.14.276-syzkaller #0 [ 109.078270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.087607] Call Trace: [ 109.090189] dump_stack+0x1b2/0x281 [ 109.093812] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 109.099601] __lock_acquire+0x2e0e/0x3f20 [ 109.103740] ? aa_file_perm+0x304/0xab0 [ 109.107702] ? __lock_acquire+0x5fc/0x3f20 [ 109.111923] ? trace_hardirqs_on+0x10/0x10 [ 109.116143] ? aa_path_link+0x3a0/0x3a0 [ 109.120105] ? _raw_spin_unlock_irqrestore+0xaf/0xe0 [ 109.125196] ? try_to_wake_up+0x6de/0x1100 [ 109.129423] ? trace_hardirqs_on+0x10/0x10 [ 109.133642] ? migrate_swap_stop+0x880/0x880 [ 109.138035] lock_acquire+0x170/0x3f0 [ 109.141825] ? vfs_fallocate+0x5c1/0x790 [ 109.145873] __sb_start_write+0x64/0x260 [ 109.149923] ? vfs_fallocate+0x5c1/0x790 [ 109.153982] ? shmem_evict_inode+0x8b0/0x8b0 [ 109.158377] vfs_fallocate+0x5c1/0x790 [ 109.162257] ashmem_shrink_scan.part.0+0x135/0x3d0 [ 109.167183] ? mutex_trylock+0x152/0x1a0 [ 109.171232] ? ashmem_ioctl+0x27e/0xd00 [ 109.175196] ashmem_ioctl+0x294/0xd00 [ 109.178984] ? trace_hardirqs_on+0x10/0x10 [ 109.183202] ? lock_downgrade+0x740/0x740 [ 109.187335] ? ashmem_shrink_scan+0x80/0x80 [ 109.191642] ? futex_exit_release+0x220/0x220 [ 109.196124] ? ashmem_shrink_scan+0x80/0x80 [ 109.200433] do_vfs_ioctl+0x75a/0xff0 [ 109.204222] ? lock_acquire+0x170/0x3f0 [ 109.208181] ? ioctl_preallocate+0x1a0/0x1a0 [ 109.212574] ? __fget+0x265/0x3e0 [ 109.216017] ? do_vfs_ioctl+0xff0/0xff0 [ 109.219980] ? security_file_ioctl+0x83/0xb0 [ 109.224374] SyS_ioctl+0x7f/0xb0 [ 109.227730] ? do_vfs_ioctl+0xff0/0xff0 [ 109.231693] do_syscall_64+0x1d5/0x640 [ 109.235572] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 109.240749] RIP: 0033:0x7fbaa5dc60e9 [ 109.244445] RSP: 002b:00007fbaa473b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 109.252145] RAX: ffffffffffffffda RBX: 00007fbaa5ed8f60 RCX: 00007fbaa5dc60e9 [ 109.259400] RDX: 0000000000000000 RSI: 000000000000770a RDI: 0000000000000005 [ 109.266742] RBP: 00007fbaa5e2008d R08: 0000000000000000 R09: 0000000000000000 [ 109.273996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 109.281251] R13: 00007ffdcbd10cdf R14: 00007fbaa473b300 R15: 0000000000022000 15:28:20 executing program 3: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) unshare(0x40600) pwrite64(r0, 0x0, 0x0, 0x0) 15:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 3: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) unshare(0x40600) pwrite64(r0, 0x0, 0x0, 0x0) [ 109.307478] overlayfs: unrecognized mount option "xino=auto" or missing value 15:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 3: mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) unshare(0x40600) pwrite64(r0, 0x0, 0x0, 0x0) 15:28:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) [ 109.375377] overlayfs: unrecognized mount option "xino=auto" or missing value [ 109.432959] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 109.443250] overlayfs: unrecognized mount option "xino=auto" or missing value [ 109.477145] overlayfs: unrecognized mount option "xino=auto" or missing value 15:28:20 executing program 0: mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000120000002200000060", 0xd, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x839, 0x1000}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000011e00)="02", 0x1, 0x8400}, {&(0x7f0000011f00)="03", 0x1, 0x8800}, {&(0x7f0000012000)="04", 0x1, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x57d, 0x9000}, {&(0x7f0000000140)="00000000000000000100000000000000000000000000000000000000000000000000000000000000085a2206afea54eaef", 0x31, 0x9c00}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003", 0x3d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002", 0x1b, 0x11580}], 0x0, &(0x7f0000013c00)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r4, 0x0) fchown(r1, 0xee01, r4) 15:28:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) [ 109.623760] overlayfs: unrecognized mount option "xino=auto" or missing value [ 109.623802] overlayfs: unrecognized mount option "xino=auto" or missing value [ 109.641887] overlayfs: unrecognized mount option "xino=auto" or missing value 15:28:20 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:20 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) [ 109.756903] overlayfs: unrecognized mount option "xino=auto" or missing value 15:28:20 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) [ 109.824853] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 15:28:20 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:20 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:21 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) 15:28:21 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x1000010, &(0x7f0000000a80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@privport}, {@cachetag={'cachetag', 0x3d, 'redirect_dir'}}, {@debug}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x2}}, {@cache_loose}], [{@fowner_lt={'fowner<', 0xee01}}, {@pcr={'pcr', 0x3d, 0xe}}]}}) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1, 0x0, 0xdf, 0x80, 0x0, 0x7, 0x2440, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0xffff}, 0x48080, 0xe746, 0x3ff, 0x4, 0x40, 0x0, 0x4, 0x0, 0x100, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x10080, &(0x7f00000009c0)=ANY=[@ANYBLOB="78696e6f3d6175746f2c776f726b6469723d2e2f66696c65302c776f726b6469ca41effded788bfcaeb15818dc723d2e2f6275732f66696c65302c72656469726563745f6469723d2e2f66696c65312c6e66735f6578706f72743d6f6e2c6d657461636f70793d6f6e2c75707065726469723d2e2f6275732f66696c65312c696e6465783d6f6e2c"]) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x8c) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=.']) chdir(&(0x7f00000006c0)='./bus\x00') chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) lseek(0xffffffffffffffff, 0x4, 0x0) 15:28:21 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 15:28:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)=