WARNING: can't dereference registers at 000000009115db3a for ip common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 overlayfs: failed to decode file handle (len=8, type=1, flags=0, err=-22) device Y4`Ҙ left promiscuous mode overlayfs: at least 2 lowerdir are needed while upperdir nonexistent overlayfs: unrecognized mount option "ubperdir=./bus" or missing value IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. overlayfs: at least 2 lowerdir are needed while upperdir nonexistent overlayfs: unrecognized mount option "ubperdir=./bus" or missing value netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. audit: type=1326 audit(1646068623.175:17514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4538 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fdf0479b049 code=0x0 audit: type=1326 audit(1646068623.325:17515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4567 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fae7521c049 code=0x0 audit: type=1804 audit(1646068623.415:17516): pid=4580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir496045515/syzkaller.3M3TLC/203/cgroup.controllers" dev="sda1" ino=14162 res=1 XFS (loop1): unknown mount option [no]. audit: type=1326 audit(1646068623.565:17517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4610 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd574488049 code=0x0 audit: type=1326 audit(1646068623.595:17518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4614 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8599ed0049 code=0x0 audit: type=1326 audit(1646068623.695:17519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4627 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8599ed0049 code=0x0 audit: type=1326 audit(1646068623.695:17520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4629 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f563be9e049 code=0x0 audit: type=1326 audit(1646068623.825:17521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4643 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f563be9e049 code=0x0 EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 2)! EXT4-fs (loop2): group descriptors corrupted! audit: type=1326 audit(1646068624.195:17522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4698 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8599ed0049 code=0x0 audit: type=1326 audit(1646068624.315:17523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4718 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd574488049 code=0x0 FAT-fs (loop5): Directory bread(block 6) failed IPVS: ftp: loaded support on port[0] = 21 netlink: 84 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. kauditd_printk_skb: 1 callbacks suppressed audit: type=1326 audit(1646068629.416:17526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5247 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fdf0479b049 code=0x0 audit: type=1326 audit(1646068629.416:17525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5238 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f563be9e049 code=0x0