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", 0x2000, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(r3, 0x1, &(0x7f0000000b00)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) syz_fuse_handle_req(r0, &(0x7f000000a3c0)="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", 0x2000, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:52:04 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000001780)={0x5, 0x6}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x9, 0x1, &(0x7f00000017c0)="37879246d2dd58ac1f61125b42798124ff7f4ee56b3dc66197b621ce1fe408eec679e17ceb2858a9698fabfbf9f91a3fbb173659b550cae607c1cad9beef5c01bba64ad3767ff2d586b7f0ecd1f2000f940a2c5c7b3552ac92e8859a056717b5827a0b88a245305d4f4ccdcff8bb4bffc0b71cb27c9e79ff9302a423674054701cd5d9a9d6249e7c66bf7ddd088650e515badbb155a117a501215b087b9279dbe80e230901233063720c0a378067ac3ca29777b4ec995db75a2f7ebeaca165205b96989bf09faf6af5c1e86c88a410c3abc952cbcfd8f0", 0x8, 0x0, 0x0, {0x3}}, 0x26) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 143.675447][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.694209][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.730909][ T8545] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 143.782973][ T8398] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.793756][ T8732] fuse: Unknown parameter 'fS¯0x0000000000000004' [ 143.811591][ T8697] loop2: detected capacity change from 0 to 12 [ 143.822284][ T8409] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 143.830887][ T8398] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.831846][ T26] audit: type=1804 audit(1635105124.818:2): pid=8732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir730445449/syzkaller.OrWzYe/1/file0" dev="sda1" ino=13914 res=1 errno=0 [ 143.850174][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.899846][ T8409] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 143.941180][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 19:52:05 executing program 2: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000180)={{0x2, 0x1, 0x800}}) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d1) fcntl$setown(r0, 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x1, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x844) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) setfsuid(0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000080)=0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x80, 0xffffffff, 0x6, 0xfffffffffffffff9, 0x0, 0x5}, {0x6, 0x20, 0xd4, 0x3, 0x10000}], ['\x00', '\x00', '\x00', '\x00']}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000040)) ioctl$VT_ACTIVATE(r3, 0x5606, 0x7) 19:52:05 executing program 1: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000001780)={0x5, 0x6}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x9, 0x1, &(0x7f00000017c0)="37879246d2dd58ac1f61125b42798124ff7f4ee56b3dc66197b621ce1fe408eec679e17ceb2858a9698fabfbf9f91a3fbb173659b550cae607c1cad9beef5c01bba64ad3767ff2d586b7f0ecd1f2000f940a2c5c7b3552ac92e8859a056717b5827a0b88a245305d4f4ccdcff8bb4bffc0b71cb27c9e79ff9302a423674054701cd5d9a9d6249e7c66bf7ddd088650e515badbb155a117a501215b087b9279dbe80e230901233063720c0a378067ac3ca29777b4ec995db75a2f7ebeaca165205b96989bf09faf6af5c1e86c88a410c3abc952cbcfd8f0", 0x8, 0x0, 0x0, {0x3}}, 0x26) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) openat$procfs(0xffffffffffffff9c, &(0x7f0000001980)='/proc/bus/input/handlers\x00', 0x0, 0x0) [ 144.068470][ T2976] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 19:52:05 executing program 4: ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000080)=""/108) r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000002a40)={0x210, 0x27, 0xca1ac799a84bf95f, 0x0, 0x0, "", [@nested={0x200, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}, @generic="5eec59dcb893a5c664db70f12b6d3e62ffbbdb0f76d0056f3809c6a62ef788ee44f408b7238a09667449fc5d9cb390edbe7d5ce1513465e5502f66d3d68fdc2ad232a411024f0f9bb1885af64df28f4763667692eaf543fe54232d0222da38fd25d21d2eecbf16c101e422fa0f6acb8842fb71ca4c2b6be0a27c8241f3690fb8d94a53f2a8124e66d4a55b6fa574fef85b45f7104cbd8cd0a52de5829132767cae8e519d00e4c0194f08e3d70f03d9b5", @generic="bc33213452b7dfb85a56e3e62b504373641346b0118a5de531542c0fa424a1488636c4e8a09a739c5601432431e4f888a571fce70ff8553eb024fbdf5bd0b14082f149d1a11253a6f494b15b428b4ddfce3357f478c094c3d74aff1a68d2e9731e96499cdd9500f2b77e1327a2c021a611d689e0c464bdc53a7716fd8ec5d0495953502f01b065cad31c", @typed={0x61, 0x0, 0x0, 0x0, @binary="4e12ec7706781550206bcd5e519d4beb307040df79d68bec0b4383e8d1930823ec06b92db0dcf1793936b92f9abc8431575e989ee10dc50ec71724e8518742fc5e22394db63417605871ac7ffaeb0b31b31565fb52043aed0152df14ff"}, @generic="364e3b276dbb030613d77fca05295e8a295a67e72b351f9e047b8b2dded0f00721f65d9a87055c0c0d80a174f7eb53d854510d803dae821ee3332ac4885b85544f004b01b742362c0874"]}]}, 0x210}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000100)) [ 144.138592][ C0] hrtimer: interrupt took 30330 ns [ 144.193356][ T8764] netlink: 488 bytes leftover after parsing attributes in process `syz-executor.4'. [ 144.225016][ T8766] FAT-fs (loop5): Unrecognized mount option "obj_user=" or missing value [ 144.242711][ T8764] unsupported nlmsg_type 40 [ 144.250450][ T8769] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 144.342895][ T8766] loop5: detected capacity change from 0 to 255 [ 144.413441][ T8766] loop5: detected capacity change from 0 to 16383 [ 144.504126][ T8790] FAT-fs (loop5): Unrecognized mount option "obj_user=" or missing value [ 144.505144][ T8771] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 144.573698][ T8766] loop5: detected capacity change from 0 to 255 19:52:05 executing program 5: syz_emit_ethernet(0x11a, &(0x7f0000000000)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x3a, 0x4, 0x0, 0x0, 0x10c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@cipso={0x86, 0x28, 0x1, [{0x1, 0x10, "839d2c93d2ad23cbf10e9fabc88c"}, {0x0, 0x12, "7e753425fcc94dd7739dd6522bf5bca0"}]}, @cipso={0x86, 0x68, 0xc492bf99eb3a5773, [{0x2, 0xe, "c28324ae1c0b22f7ce9ce8be"}, {0x1, 0x2}, {0x5, 0x3, "12"}, {0x1, 0xd, "da9808f83ea7475bea47a4"}, {0x5, 0x10, "ee26b8c98b07baf4497d5293800e"}, {0x2, 0xc, "e307870fe12411e29e64"}, {0x5, 0xb, "25c30bf2966557cf7a"}, {0x6, 0xe, "c75f7d538292c092f8e59832"}, {0x6, 0xd, "8f551436e23c44835e8dc0"}]}, @timestamp_addr={0x44, 0x44, 0xdd, 0x1, 0xc, [{@empty, 0x3}, {@local, 0x3}, {@local, 0x55}, {@empty, 0x4}, {@multicast1, 0x5}, {@multicast2, 0x80}, {@empty, 0x7ff}, {@private=0xa010100, 0x40}]}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}, "00006371ae9b1c03"}}}}}, 0x0) 19:52:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000080)={{0x6, @rose}, [@bcast, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) listen(r0, 0x0) unshare(0x40000000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x66000200) r1 = socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000200), 0x10efe10675dec16, 0x0) write(r0, 0x0, 0x0) unshare(0x28040080) write$binfmt_misc(r0, 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c0000002e00100025bdf000fcdbdf250000c22ddec63ee7ffa400"/39, @ANYRES32=0x0, @ANYBLOB="0d0009000a00f2ff0b000d0008000b000100000008000b00ffff000008000b000400000008000b00f9ffffff08000b0004000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004050}, 0x44000) 19:52:05 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000740)=""/377, 0x179) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00040010001fffff005efdf2180000000000ee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a002615a3053e8c1d"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"/913], 0x26c}, 0x1, 0x0, 0x0, 0x844}, 0x4000041) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x480, 0x0) perf_event_open(0xfffffffffffffffe, 0xffffffffffffffff, 0x2, r2, 0xb) setitimer(0x1, &(0x7f0000000140)={{}, {0x0, 0x2710}}, &(0x7f00000001c0)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r3, &(0x7f0000000100)={[0x910]}, 0x8) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 19:52:05 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000001780)={0x5, 0x6}) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:05 executing program 2: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000180)={{0x2, 0x1, 0x800}}) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x101) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d1) fcntl$setown(r0, 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x1, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x844) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x360, 0x3, 0x4e0, 0x0, 0x268, 0x300, 0x240, 0x268, 0x410, 0x460, 0x460, 0x410, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f8, 0x240, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x800, 0x9}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'ip6_vti0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) setfsuid(0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000080)=0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x80, 0xffffffff, 0x6, 0xfffffffffffffff9, 0x0, 0x5}, {0x6, 0x20, 0xd4, 0x3, 0x10000}], ['\x00', '\x00', '\x00', '\x00']}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000040)) ioctl$VT_ACTIVATE(r3, 0x5606, 0x7) 19:52:05 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000001700), &(0x7f0000001740)=0x4) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:05 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000740)=""/377, 0x179) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00040010001fffff005efdf2180000000000ee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a002615a3053e8c1d"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"/913], 0x26c}, 0x1, 0x0, 0x0, 0x844}, 0x4000041) r2 = openat$null(0xffffff9c, &(0x7f0000000000), 0x480, 0x0) perf_event_open(0xfffffffffffffffe, 0xffffffffffffffff, 0x2, r2, 0xb) setitimer(0x1, &(0x7f0000000140)={{}, {0x0, 0x2710}}, &(0x7f00000001c0)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r3, &(0x7f0000000100)={[0x910]}, 0x8) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 19:52:05 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 144.891118][ T8810] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 19:52:06 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000001700), &(0x7f0000001740)=0x4) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:06 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000000)) [ 145.151204][ T1212] device hsr_slave_0 left promiscuous mode [ 145.187296][ T1212] device hsr_slave_1 left promiscuous mode [ 145.217901][ T8853] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 145.237167][ T1212] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 145.265245][ T1212] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 145.297553][ T8853] overlayfs: missing 'lowerdir' [ 145.318831][ T1212] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 145.328823][ T1212] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 145.344698][ T1212] device bridge_slave_1 left promiscuous mode [ 145.358922][ T1212] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.395559][ T1212] device bridge_slave_0 left promiscuous mode [ 145.421368][ T1212] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.481437][ T1212] device veth1_macvtap left promiscuous mode [ 145.498906][ T1212] device veth0_macvtap left promiscuous mode [ 145.513753][ T1212] device veth1_vlan left promiscuous mode [ 145.526741][ T1212] device veth0_vlan left promiscuous mode [ 145.843265][ T8891] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 145.905497][ T8893] overlayfs: missing 'lowerdir' [ 146.183630][ T1212] team0 (unregistering): Port device team_slave_1 removed [ 146.198258][ T1212] team0 (unregistering): Port device team_slave_0 removed [ 146.213972][ T1212] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 146.240368][ T1212] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 146.334268][ T1212] bond0 (unregistering): Released all slaves [ 149.122893][ T8969] chnl_net:caif_netlink_parms(): no params data found [ 149.255071][ T8969] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.264356][ T8969] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.272677][ T8969] device bridge_slave_0 entered promiscuous mode [ 149.281971][ T8969] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.290869][ T8969] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.299550][ T8969] device bridge_slave_1 entered promiscuous mode [ 149.323750][ T8969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 149.342950][ T8969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 149.374399][ T8969] team0: Port device team_slave_0 added [ 149.382857][ T8969] team0: Port device team_slave_1 added [ 149.422487][ T8969] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 149.429676][ T8969] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.456608][ T8969] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 149.476300][ T8969] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 149.483305][ T8969] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 149.511860][ T8969] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 149.546338][ T8969] device hsr_slave_0 entered promiscuous mode [ 149.553877][ T8969] device hsr_slave_1 entered promiscuous mode [ 149.654386][ T8969] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.661945][ T8969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.670086][ T8969] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.677331][ T8969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.733474][ T8969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.758462][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.767527][ T9101] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.775554][ T9101] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.785277][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 149.801906][ T8969] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.827741][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.837621][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.845040][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.864338][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.872719][ T8505] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.879997][ T8505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.897648][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.917517][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.925453][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.934661][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.943291][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.955070][ T8969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.986434][ T8969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.994496][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 150.002833][ T9101] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 150.091616][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.124796][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.135053][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.146791][ T8969] device veth0_vlan entered promiscuous mode [ 150.158006][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.166372][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.180571][ T8969] device veth1_vlan entered promiscuous mode [ 150.212419][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 150.223094][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 150.233264][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.248404][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.265577][ T8969] device veth0_macvtap entered promiscuous mode [ 150.282017][ T8969] device veth1_macvtap entered promiscuous mode [ 150.319923][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.331178][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.341496][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.352739][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.363422][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.374505][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.384734][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.395809][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.406637][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 150.419804][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.431316][ T8969] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 150.440210][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 150.449841][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.458679][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.467372][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.478709][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.496336][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.513217][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.524879][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.537270][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.548008][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.558488][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.569507][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.579566][ T8969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 150.590309][ T8969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 150.601612][ T8969] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 150.612614][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.622222][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.731157][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.764658][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.798327][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 150.830061][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 150.839024][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 150.860746][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 19:52:11 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:11 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000000)) 19:52:11 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:11 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000016c0)={0x0, @local, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:11 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2008, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000006c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207280902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x10000, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7, 0x1fd, 0x2}}, 0xe8) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1, 0x6a, 0x8, 0x9, 0x0, 0x3, 0x14000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x80, 0x1, 0x2, 0x0, 0x1, 0x8, 0x71, 0x0, 0x3}, r1, 0x8, r2, 0xb) r4 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000006080)=[{{&(0x7f0000006200)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80, 0xfffffffffffffffc, 0x0, &(0x7f0000006280)}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000009c0)="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", 0x1000}], 0x1, &(0x7f0000000540)=[{0x98, 0x10e, 0x8528, "6611853e0763f916bc633ec9f769b8af168f6fc057ab12a1e9db8df9296896fa6a1e5bacd028d3b261193d6c04cd99d026a95d1a71985d876b0573dcdb11745b615e5dff8c19327224625a94326e163f93019b9c1de72d792a8c1481cb3e56ccb3cd3fbd31febbdfbe8acf8f841afaf13afb8c2ed0fabb479f82686bdc1edd14fa1b930e"}, {0x50, 0x119, 0x40, "6b339bf6cd5bc03c4fe23e07d8aca998b435fb09c1f6ddcf2eda00b6dca29993f63018606dcb9c446ea46ea470712773b4481f3ccb094617c032c5"}, {0x40, 0x108, 0x7fff, "03271d20c22947e3617c19e3570110171440765b95b6c4a6d613a5b56d26a9c738a8a63f779b610ef1c21cf76dec0285"}], 0x128}}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @broadcast}, 0x3, 0x2, 0x0, 0x1}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000001a80)="e5297b4a6519b8b09b6170b4e668c97a6dd537dffd70cfd3847b7c933c184ccc8a4b8420a4", 0x25}, {&(0x7f0000001ac0)="485a3f99309ed7b2e197b95f290e50af79b7f5f8a560959e1acb5303a285b8835d1e190bfe814f5f163a47974a39dd34f016c5e4495cf9822ebf93515e544be57542e14d", 0x44}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="0dd234386621ed0795a270113ae84a2af7de8eca446c985168b0baef30cdba96d74947f665bf3e31a564b977b0e88943c009799810c35b2a0a474d155293cd1957573541a0be3a5d4d3749613b19f9d97fe68aaf9d069bff2cef4bf438f69703ff8a94d8ac57096c0c77e2248b0510f8ecb43b58742b2f1b683926bbef169870ae0a0f32fb9554c3c9bde8e8b408f6d6370a", 0x92}, {&(0x7f0000002c00)="b970bf4ad070af9be26eeb604eb8e28fdcda96d2be1ccf1cbfddb454e1cb469434dfde9035", 0x25}, {&(0x7f0000002c40)="a67906bfea6fe0fa98112e63b373c8ebbb3a1a50eff53a43dd833b2a294f6819262259e7e34135673ed13847ea832b1120650d731e091ba24f25a9d7658b04c2ac8f7b97c0a78b9c4724067c9d20a90914bfcfc4a97bc8c80623c83badb04a4e85f02073ade096f93a92604da48faf95191121a83f903cdab38caa25411ebd531364d7d507476d2286a9efa700e8afe7db1d3be3f1da8c3cb1d59c3cd1b81bdfd44ae9a28ce4b80f8c5547a2d18e8ab0d1748fb9439b2b3227", 0xb9}, {&(0x7f0000002d00)="b3acb7c3f057dcd03b6a4da0c5f58de7ddce0426928cedfd2a5ef5a8b0763b2c9918fb966e4b63626cbbfec7687e2d855e6aa4854b08a517d7900f9a4f923621cb07", 0x42}, {&(0x7f0000002d80)="9f4579e2cad69df0d16b7ce26fadb6abcc79191a38289ed07ee71714b42d5c53d38ee127b3769cd103d06154ef696f7353e00f45543cf4c07392cccefd9f719c68ffb3c5717c6de05e1277a89fd96e88675c0c5bc1249f22c0cc54137101923783dd85733fb7dbfd5c8b4655c6c828995cb0cfa3bf5c895d113a0aacdc95b0c171e33673642cd0abbfd64c8cbee0427e8681639c27e9850894fc88f0220a285a6e2a0e172a40ae2ab96a3fade3f30329ff41c831572924a8debef75dc1be576b684cd9013a00", 0xc6}], 0x8, &(0x7f0000002f00)=[{0xe8, 0x103, 0x20, "7b11fcf0ffd535f32198f3abe445326bffb3e20dc37376fa53148f48ca49ed082fabaf3c67a4bc9fae04f0924390be8bf9b43b3f01cd0c3aa5a29d5ec34e1b7b83294d34bdf29347a400fd6835522a0b9959afd9300c9038a1d2038a4cde5fb42fc828e318cf564551e99d1a5f4e51bde17e0b05b14dbeef470db75980e78e27477b3bbbbdb0502480c7dc5dbdcc52d3cd7aae83955e3886b595bedfef4bf2439411d9279b5b9559248dd7eeb616cfe4023f8e067bf555973bd790818cd2f91e410a28c331a900000000000000f7ffffff0000"}, {0xa0, 0x84, 0x6e, "e0f347d1f2f518f0f73179f34972efa9c75163b6082c62860c56d8698d118b6a3d14b3771b7f6647b97e700424081f2eb7f601bbeb97ffbde4dafcb52f8fd61fbfa8b1887f4a952c92da275f79ea572ea52ce55baa0b7caa5c03740fad084bcbd6e264e769fe535bbcb4829a6d8fc76402dc04f65af41874a7c4f1503c18a5e21ef5e5342ec0e1bcfb94"}], 0x188}}, {{0x0, 0x0, &(0x7f00000045c0)=[{&(0x7f00000030c0)="587642ae3916ac0b7789d55483768cc0d8c333ab05781158271de0ff94caa0ab54a9f683b93bd1b7bb6e044d61a84280a3da8c3c98673835f438b0905b33fb81f04a54982f9adaa4ff2d53432c0289e84ecee70e", 0x54}, {&(0x7f0000003140)="222d498a1e1682aa74bcfce6da08cc40dbb1ff09f42f0579022fc7e6f17663240baa2c63a2c5af", 0x27}, {&(0x7f0000003180)="bbf0a35d384bdeb91fcbd5a41916ae0651af74f113d83f1cbd17494dc484ef960ec0734e680b2527fcfcf78587a546173cff96b7748822c80c346be03da600606e", 0x41}, {&(0x7f0000003200)="bff7781f960327a1421caf57cad4c419a2683d69b36fdd5b860985ccc153bd0d91fa7eb85c00b6b253d89bdf14d8f4f62f290b9540b79d34804b11e1d1d8f3f7a237dc1010241f4bff7b94ad5ddaaa5956e8feae12a7245cb3213bfc3f67ef4bb47c02eb6aad9f8a8e7fdbea567603bd5edd6f157ebc20c8e4d18fb461cd20843c67369e2a8adb9bf48caa5a2157e5e6d06cdd2e4c0bb2f85ccbb1cc669d3d533e4cc53c8c98dbdcf701b5796d49a5c94fdaf73432e7981b7681b5beec783616f62a006867f9b57693295497d61a292912ce09bea96bbd19382aefd6a1ac45ce16a1af2dd3d3e62e500412f51103160b8a409c", 0xf3}, {&(0x7f0000003300)="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", 0x1000}, {&(0x7f0000004300)="dd33480bc38400b31bd6889f50706b78426fa44dcd1f2a51b8ebd2616fb638eb08ce8a22ab478a11501588e2ed84d4f6cdf3d288ed66ac56bd7957b3e129a624277f1e8a36aa7bdcb309e8e8e00f89da41058e5ee5ab364696de0cb5f3bf9ae5efcd938ba8b14d50b62d0a5903ba1b04db0e141dfda4cfd42138f6980ff8f4cbb8a617d73d2e44f3b962cd7b1a85d6387d04948057269ea262c35b8f1e9a7bbe0fea5011655c99220aac24d95c98e8c71541bef85337006f235f88c7f88da11c45af07a3b9", 0xc5}, {&(0x7f0000004400)="f176e10cd82f60b964db0ad4b2eb938d5389406fc8df71ce9e035715945532a2e459c17e35549b41", 0x28}, {&(0x7f0000004440)="0cb339221e652f0c706d962473c16068f64c12dfb2d5f6aff98d595178539949d137ae1dce5e55a323d3e7f7075a7c3f44df7e391cf57ab69f9677cd03d475d86259a8f2521c0e9f8e584ce90421aa32f14515a8df8323a4f7b0780851a2fb9c1a07ce591189fa5d50dcf7099447f92c138f82ef67e2", 0x76}, {&(0x7f00000044c0)="a2d24c935cc4ef60148993bad18e21d7a889c3741f7d875c4385c7f20eaec569ba379d809e9f2a0c4d7f5063d1969cef19fb1194288c01930b6968782b6faf92afc85edf5f967fdc1f6ef3ea7b35d449ef911fc8383c12750a233dac2fe003841588857175c68052d39b7d4a35cfd8fd1fae160a8fd5c18e9e8acbce48408fafca6bfa84e07af6debc166d1072204527e82f9cd7de5fcbc31d3da11719b15f873e8003cd9e0956c00989e5ec55a9dddf1e163480c099aa15bdfcce4918b3baf63efac82594f7ea22388bc90997b342d3e90481d54acf63094ada06c772b583", 0xdf}], 0x9}}, {{&(0x7f0000004680)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'syzkaller1\x00'}}, 0x80, &(0x7f0000005c00)=[{&(0x7f0000004700)="c03de685eb07609e088174e71199aec048704b04eb47f933bad3", 0x1a}, {&(0x7f0000004740)="894596dabe5462e7e79ba79e9be4cf59700f5b7c809068f10675c2efdc856c6662a693615cc400bc2960b6c95b046dba7f7dffa2d55399b6eae63f42afff573824a35249ad4dacf322288e6dbfaa17868fd8030a96fbd74d5a0f1ad9f85fe42578137c09533d178c9ebd81188f37ac024bf282f5e7940e235619b53d2c2d92a4d0ae4a45290a6e318b5c3b563878bc97f9a1c0d1f6b1189d571efa1dadc576a2795815e09c497ca5ad1026abb2d66337b5b60e7fd0", 0xb5}, {&(0x7f0000004800)="6d5c01508a21d2592283d5afc86628eb0d7e786a2eae63583178288446198fc1dc17436df96bf67e25f177dc1e5928324a129327ff599204e7651e6c38907fcfbd3f0fbcd7e0c98a356d95b850cac8443026776cd6c922095520bc63de92ca3b4a40439af1b8f36ee7c95b4581a23a9be34b8b6bcf5fa8105e121e9cb3ffbf9cd6312e0fdae4fecb0a5c7508371c4cc6ca79682eaa92272d18c6769edd0a129c5336b221289039395d3761c77fb6785ea99d95e2cb070da98f334a198af2dd4199ec3cd17c61ce49f165ed", 0xcb}, {&(0x7f0000004900)="200fb762821db6589d42377f76a824", 0xf}, {&(0x7f0000004940)="0dabca2f40b3ad91e0e833df9a2fee2a13624238c9dca679268ee09a511110fdf880aba3f5e7a63b34d56425895f6f1d590ce7cc1fd2626209eceecf33a8e01fcaca94e57ba0cea9801aa7c55b25785b85f954e584131d560664717ba9bc627ff2549b781354026fe3067c53ecf92a29e47a3bdd05ef93838073675ddee4c2b26668b141766e7c65dd3d243e3928622d44941b4961636d77509f74f30d4bf6001b2c970f07244e80d579d35c8238eac6fc7539b083c2f69879cba4e5543b0893c0fe333cd6fd48b173aea134f340f2f938fbd54d06f8e9aa49b8b4e157e7a87ed46c8c7167376e6f502294a7de8a", 0xee}, {&(0x7f0000004a40)="4fb598d5e91b4dc7f007c3e824c60af6f7a4321d0e91c2e689c924f6d17dc2179b7a18d9583a3d69e4f3cadb717c49392d3b3a98ae3e1444fb9734d8689eaeba79983bdba1e9f22eb7cb4bba9883c6370e4a13fab1763210533218daa2d96c7b0521cd5e3738c84a40eb9d7774c2d0797f1701abfbb596af1b440ec42662109019ff4d4f768bb825f2854ced48c49886e5cac5ffd849b507562330c306d0d031ded3", 0xa2}, {&(0x7f0000004b00)="c7aedd06c26b57c8ea3e44880215b558e29268c87b934c367d4112ae539768992935e6f4e50cec0107a8060b3110914d4c2c060e83f4af1d7f39ba386b0a05f9079dd12f117fc7bd7b3c3a7b95c605f966d173a4fd358392838cca5fd85bd11048cc826ebe47a79d268539d15f907cd4b526aa3cf93fe034ea91845e264fc4443ca9895c28a62f086ed1f9c9bd411a13929774cbab728154d026e6cf0f0742a5579052d7bc2126b6aa379bf64b159ca9ebdb571b4c555bdba83b28b92c016c97f4adb187fc57a27b91e718463462810cc818b17e2086cd669f", 0xd9}, {&(0x7f0000004c00)="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", 0x1000}], 0x8, &(0x7f0000005c80)=[{0xa8, 0x11, 0x5, "be5a68d34f3aa6832b2d2a0e6e6b8f100682514179a0fd7255caf8048517846bfc6da8fc554534b44854f10094d1170656970540304a6f509633f9d829b7b43aa60b978bc8f358eebd6ee2bec9a1763bee84a87b1e7c9e4f58a117480b4b0c4b03dde303db2e07f24a529eba0e6fbf80134a32f55a298eac9a288bdf681a945e097a32586460b7d3374cbb771fcb4c94c26733"}], 0xa8}}, {{&(0x7f0000005d40)=@in6={0xa, 0x4e26, 0x23, @dev={0xfe, 0x80, '\x00', 0x15}, 0x7fffffff}, 0x80, &(0x7f0000006040)=[{&(0x7f0000005dc0)="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", 0xfc}, {&(0x7f0000005ec0)="3dc85352936079159d8bf4644d4074a823940042fa87bc3a264aa90c704664ad3d6044937fd88834b5e11c9407a52c87c043190424f7817027c8ef0dade3283b757abd2ae4ecac522d5851bdde14fa346ab2afdbcc2561b3a63b29a42af3a0c7646ae16d7fcb9433804d082ee958f4c23949c3e6d0", 0x75}, {&(0x7f0000005f40)="212e4ed77fc7c9405456d6bb6c5d6b5431aec80f9fae4902c0eb79d1fc566dddeb7e5a3537e19055b77be923faf2f0ee928e44de83c4c4f6adf993b3955e9d253b174345a505629886bbbc86ccd93ad63f26c10c7991c027184e8d3df2b47880a689bdec3fb0353eaaffaf235ac86d9f7124790bb12d86819d8e63f53efdb649a4d3f0a3320eb90d497bb74a3c059c8842288719146d07cfc8dc8361c252e08c5fd0814e8edbed0ed1ae74695d8ee5c6b559a20e6d271a9cfaf9d7635fcc6d4b9be983fdc6570711fd9d1625d3eb93a278dd41493e4971f5bd38244119ccb404a2d1d5935bfc01f724ac5fab", 0xec}], 0x3}}], 0x6, 0x0) fork() dup(r4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x516}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000400)=0x10) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0xfa, 0x3f, 0x0, 0x8, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x100000000, 0x755, 0x4, 0x6, 0x0, 0x7, 0x0, 0x1da6, 0x0, 0x3ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r5, 0x0) [ 150.926119][ T9101] Bluetooth: hci1: command 0x0409 tx timeout [ 151.133366][ T9320] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 151.198030][ T9321] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:12 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 151.257665][ T9327] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 151.280829][ T9320] overlayfs: missing 'lowerdir' [ 151.297088][ T9342] overlayfs: missing 'lowerdir' 19:52:12 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000000)) [ 151.391959][ T9327] overlayfs: missing 'lowerdir' 19:52:12 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000000)) 19:52:12 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:12 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:12 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:13 executing program 1: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:13 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 19:52:13 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:13 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:13 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:13 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:13 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 19:52:13 executing program 1: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 152.502611][ T9445] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:13 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) dup(r2) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:13 executing program 4: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = dup(r2) sendmsg$nl_route_sched(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@delqdisc={0x54, 0x25, 0x10, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0xc}, {0x0, 0x1}, {0x0, 0x10}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0x5}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x1ff, 0x7, 0x2}}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24008001) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:13 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 19:52:13 executing program 1: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 152.600298][ T9452] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 152.630910][ T9445] overlayfs: missing 'lowerdir' 19:52:13 executing program 4: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffc000/0x2000)=nil) r0 = perf_event_open(&(0x7f0000003640)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) sync_file_range(r0, 0x137, 0x206f7, 0x4) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f0000000600)={0x3, 0x80, 0x0, 0x0, 0x23, 0x7, 0x0, 0xe7d, 0x20200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c28, 0x9e4, 0x404, 0x6, 0x7f, 0xfffffff8, 0x7, 0x0, 0x400, 0x0, 0x2}, 0xffffffffffffffff, 0x2, r1, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff15, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000003c0)='$', 0x1, 0x4004001, 0x0, 0x5f) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe580}, 0x10023) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000200)="934297b594e883ea28d76d955ee7e5861e7081f15e3b034034c71eee575a3a10626b56d1a64d172d07c79913c68d164307f524f8491af60f906f0d3e20e6b8f6c4e3c991213388aa6d4f23657ba2dcb5cb268575a0aabfde43ef8bbf5af496a0708d55c825cd37992c77ecd12cf98edc220195b66639d4514b7b8f2d42e5f458f7da7879d0600e8fd57f5f9e78c0ca7da25df628416ce19bdaad2f412ab82d6860952c5c38d648c78b8cea535046d23fc981fd0f7bd5bee843d4bfb29823c375d3c80d17d44974a7a1fe55b9d159ad400488ae6458eb8753ca3f7524dd44c71e32eaf7f524d002247213fed3ec7aa2f03cbf45e11fe5b02083693efae93828f9") r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='wlan1\x00', 0x10) connect$inet(r3, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) ioctl$sock_ifreq(r3, 0x8913, &(0x7f0000000100)={'wg0\x00', @ifru_flags}) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x81, 0x0, 0x53, 0x7, 0x0, 0x2, 0x1301, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0xa4, 0x3, 0x2, 0x4, 0xfffffffe, 0x5, 0x0, 0x100ffff, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_80211_inject_frame(0x0, 0x0, 0x39) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000480)={'nat\x00', 0x0, 0x0, 0x0, [0x9d4, 0x7f, 0x1, 0x4, 0x4, 0x80000], 0x6, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) [ 152.726913][ T9463] overlayfs: missing 'lowerdir' 19:52:13 executing program 1: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)=@in={0x2, 0x4e22, @private=0xa0100fe}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="adda7f2cc51d9b19cd324c89d89f9b5a4f530d306e38e3db267c8a4d8c9d02a54586afde2f5bde7d09d9e484755c5a6afbdf813754e2d33b3f2cc4f357e4c09824e9917cc6859aa6d92682491e75bef7f0328d99132f954e120660060e703c6d3d8aa9b1aab2082c142cfcdbe0740b80bf4a768e0311590f99f38400a05f858d99801aab6b5b70e4a72600d90a37a65e5282cde2b9e966391a36c82a1e1616eeec56212e11c21791cb98c2ee21160cf127a146bb7d6fd770b41ce9c365f3a17c1279a4a861cb5d2d96a03a3e2a4f5a3c6e10c87df6542e685f728ee8774144554fc0aa53f25ec1214861a3bf5a", 0xed}, {&(0x7f00000003c0)="d7906fe2dc99c3cba7f3887ef5681893c39217357e5d4e", 0x17}, {&(0x7f0000000400)="76b6cc300b06a22b07b059f45d82e00573a7db2ebd855ab447fa01a9c45caceaf9f91df2cbebf445665f5c9dfb8a941d46e536fee1e572d494a6f2742265cd03903279f6a22237678b0b012feeb30af5012120fbfbcc6f8217c80236299834ef6aa9e40fd56ee47f809df1b9e4b392f1258b5499f77b5eb1554bb6fef690e995b22a83adf82d1f8616885b88b27a54e995ef10e7e5a206bac0cea135954913ad63", 0xa1}, {&(0x7f00000004c0)="b5025e35d8a9626f00e894a6d1b323783e5c5337fc", 0x15}], 0x4, &(0x7f0000001e40)=[{0x98, 0x1, 0x4, "fb2525cf087b40ef0e11dbdfd973b8b8a2a9d4af94a5235cfcc312a56baf26bb62f41f79df0d515adcf7e2fa392128ab581b016a2b325535c644baf0f7b3118407fa42fa612ecc66dc57c976a39cb1047318b718667213f9e1aa7ed6c8b53d61e07abcfc875aab45e790b69cefadd348a491f36e7fd3fb55d5531318bede5fd35914e553761ef444"}, {0xc8, 0x0, 0x3, "9451289c48bce5567fd9c1bb554a1f7cb38601e5125015bf3df747e7b41bf5935eaff8d036ed8d77769ae8ae04f35adfe9a92d8a3935bdae880a0e44461d16b103dd0df62f8ca0d633b465ceded5d49454d3fd3784a84f74b472f00a82f38c08e7835c6b9b15159081b2272ff9fda7cac6ff3762d373619e0e47b0ce684e0815d1912a7960e7150feae51680d20a3b6f8c8e99fbde3d92c4ed30bb819e12128322313bf79f1cf29fe503104513504d9fd77fd902a20951"}, {0xb8, 0x111, 0x2, "a4c5bf5c62061695f3c6fed81f143b95ae6d94db736b6f92f5170d0a8d218acdae5b497bf4a68a4f10608cc5aad91474d007439ea3495ed20981d7722265714963b1c56212e67ee82a18180b867c0468ee45861f28c159fe5b077f40b0ff6776b530c642be3a0fb85be912d2a9615bf3bb4df45aca0bd45cac99c99377c7ee86db1d50ef07384de00100b1677e85a1bd040cfcaa3982a1f853af609b4d58ec5d560927"}], 0x218}, 0x24040082) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) close(r0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r1, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x3, 0x8, 0x7, 0x4470, 0x3, 0x3e, 0x80000001, 0x32a, 0x40, 0x1a5, 0x8abd, 0x80, 0x38, 0x2, 0x60, 0x1, 0x1000}, [{0x2, 0x800, 0x6, 0x1000000000006, 0x6, 0x8, 0x81, 0xffffffffffffffff}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1878) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000580)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000002080)=0x7, 0x4) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fallocate(r0, 0x16, 0x57, 0x9e3) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000020c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf255a00000008000300925c791da86bab927d2b3f6aaff58bc6ca1d7f9e331dce60587f00d3402fc61045e0202abb64fe10dc0c294ef0aca808bd5b773b55ca728e4949301e1fed1b8bf89ded8bad42fcfa1295f7399735ed", @ANYRES32=0x0, @ANYBLOB="0c009900feffffff38000000"], 0x28}, 0x1, 0x0, 0x0, 0x4c180}, 0x40841) [ 152.852390][ T9473] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 153.007049][ T9101] Bluetooth: hci1: command 0x041b tx timeout [ 153.187105][ T9473] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 19:52:14 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x8, 0x10, &(0x7f0000000600)=ANY=[@ANYRES64=r0, @ANYRESHEX, @ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000002000000853bab550dfde8be0000004c1109898889c48fcff0b6030000f5ae20bb52f985b6073b80ab000005000000b47c22ecffffff08800000000000009500000000000000000000000000005763ecc67347ce244740f45845e5b7735b94e847ab084114abfa82ec2f446994003aaf9335dcf8f5d8b2c57eae3d0eba5954b33ed95187dd1e494a4eee0b"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001640)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 19:52:14 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r0, 0x2000}, {r3, 0x400}, {r2, 0x4800}, {r0, 0xb291}, {r2, 0x1000}, {r2, 0x4080}, {r2, 0x8}], 0x7, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f0000000340)={[0x3]}, 0x8) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:14 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:14 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 19:52:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000580)="ed4100000004006e29c4645f29c4645f29c4645f00c242c606a83c322420ef8e115b177d0002000000040006000000000000001500000025", 0x38, 0x1800}, {&(0x7f0000011100), 0x0, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0xfffffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)={0x0}) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x0, @multicast1}, &(0x7f0000000640)=0x10) r4 = memfd_create(&(0x7f0000000d00)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = dup(0xffffffffffffffff) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f00000000c0)=0x7) r8 = fork() ioctl$BTRFS_IOC_INO_LOOKUP(r7, 0xd0009412, &(0x7f0000001700)={r2, 0xfffffffffffff001}) sendfile(r3, r1, &(0x7f0000000040)=0x40, 0x100) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f0000002700)={r5, 0x9, 0x8}) prlimit64(r8, 0x8, &(0x7f0000000540)={0x0, 0x30000000}, 0x0) 19:52:14 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 153.426916][ T9494] loop4: detected capacity change from 0 to 1019 [ 153.512770][ T9492] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 153.560821][ T9494] EXT4-fs error (device loop4): __ext4_iget:4792: inode #2: block 100664320: comm syz-executor.4: invalid block 19:52:14 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:14 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 153.642696][ T9494] EXT4-fs (loop4): get root inode failed [ 153.656390][ T9494] EXT4-fs (loop4): mount failed [ 153.663037][ T9508] overlayfs: missing 'lowerdir' 19:52:14 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:14 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000001c0)=""/201, 0xc9, 0x10201, 0x0, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 153.777249][ T9494] loop4: detected capacity change from 0 to 1019 19:52:14 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 153.962153][ T9494] EXT4-fs error (device loop4): __ext4_iget:4792: inode #2: block 100664320: comm syz-executor.4: invalid block [ 154.110089][ T9494] EXT4-fs (loop4): get root inode failed [ 154.116060][ T9494] EXT4-fs (loop4): mount failed 19:52:16 executing program 1: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)=@in={0x2, 0x4e22, @private=0xa0100fe}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="adda7f2cc51d9b19cd324c89d89f9b5a4f530d306e38e3db267c8a4d8c9d02a54586afde2f5bde7d09d9e484755c5a6afbdf813754e2d33b3f2cc4f357e4c09824e9917cc6859aa6d92682491e75bef7f0328d99132f954e120660060e703c6d3d8aa9b1aab2082c142cfcdbe0740b80bf4a768e0311590f99f38400a05f858d99801aab6b5b70e4a72600d90a37a65e5282cde2b9e966391a36c82a1e1616eeec56212e11c21791cb98c2ee21160cf127a146bb7d6fd770b41ce9c365f3a17c1279a4a861cb5d2d96a03a3e2a4f5a3c6e10c87df6542e685f728ee8774144554fc0aa53f25ec1214861a3bf5a", 0xed}, {&(0x7f00000003c0)="d7906fe2dc99c3cba7f3887ef5681893c39217357e5d4e", 0x17}, {&(0x7f0000000400)="76b6cc300b06a22b07b059f45d82e00573a7db2ebd855ab447fa01a9c45caceaf9f91df2cbebf445665f5c9dfb8a941d46e536fee1e572d494a6f2742265cd03903279f6a22237678b0b012feeb30af5012120fbfbcc6f8217c80236299834ef6aa9e40fd56ee47f809df1b9e4b392f1258b5499f77b5eb1554bb6fef690e995b22a83adf82d1f8616885b88b27a54e995ef10e7e5a206bac0cea135954913ad63", 0xa1}, {&(0x7f00000004c0)="b5025e35d8a9626f00e894a6d1b323783e5c5337fc", 0x15}], 0x4, &(0x7f0000001e40)=[{0x98, 0x1, 0x4, "fb2525cf087b40ef0e11dbdfd973b8b8a2a9d4af94a5235cfcc312a56baf26bb62f41f79df0d515adcf7e2fa392128ab581b016a2b325535c644baf0f7b3118407fa42fa612ecc66dc57c976a39cb1047318b718667213f9e1aa7ed6c8b53d61e07abcfc875aab45e790b69cefadd348a491f36e7fd3fb55d5531318bede5fd35914e553761ef444"}, {0xc8, 0x0, 0x3, "9451289c48bce5567fd9c1bb554a1f7cb38601e5125015bf3df747e7b41bf5935eaff8d036ed8d77769ae8ae04f35adfe9a92d8a3935bdae880a0e44461d16b103dd0df62f8ca0d633b465ceded5d49454d3fd3784a84f74b472f00a82f38c08e7835c6b9b15159081b2272ff9fda7cac6ff3762d373619e0e47b0ce684e0815d1912a7960e7150feae51680d20a3b6f8c8e99fbde3d92c4ed30bb819e12128322313bf79f1cf29fe503104513504d9fd77fd902a20951"}, {0xb8, 0x111, 0x2, "a4c5bf5c62061695f3c6fed81f143b95ae6d94db736b6f92f5170d0a8d218acdae5b497bf4a68a4f10608cc5aad91474d007439ea3495ed20981d7722265714963b1c56212e67ee82a18180b867c0468ee45861f28c159fe5b077f40b0ff6776b530c642be3a0fb85be912d2a9615bf3bb4df45aca0bd45cac99c99377c7ee86db1d50ef07384de00100b1677e85a1bd040cfcaa3982a1f853af609b4d58ec5d560927"}], 0x218}, 0x24040082) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) close(r0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r1, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x3, 0x8, 0x7, 0x4470, 0x3, 0x3e, 0x80000001, 0x32a, 0x40, 0x1a5, 0x8abd, 0x80, 0x38, 0x2, 0x60, 0x1, 0x1000}, [{0x2, 0x800, 0x6, 0x1000000000006, 0x6, 0x8, 0x81, 0xffffffffffffffff}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1878) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000580)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000002080)=0x7, 0x4) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fallocate(r0, 0x16, 0x57, 0x9e3) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000020c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf255a00000008000300925c791da86bab927d2b3f6aaff58bc6ca1d7f9e331dce60587f00d3402fc61045e0202abb64fe10dc0c294ef0aca808bd5b773b55ca728e4949301e1fed1b8bf89ded8bad42fcfa1295f7399735ed", @ANYRES32=0x0, @ANYBLOB="0c009900feffffff38000000"], 0x28}, 0x1, 0x0, 0x0, 0x4c180}, 0x40841) 19:52:16 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:16 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:16 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') 19:52:16 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000580)="ed4100000004006e29c4645f29c4645f29c4645f00c242c606a83c322420ef8e115b177d0002000000040006000000000000001500000025", 0x38, 0x1800}, {&(0x7f0000011100), 0x0, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0xfffffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)={0x0}) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x0, @multicast1}, &(0x7f0000000640)=0x10) r4 = memfd_create(&(0x7f0000000d00)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd930x0}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = dup(0xffffffffffffffff) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f00000000c0)=0x7) r8 = fork() ioctl$BTRFS_IOC_INO_LOOKUP(r7, 0xd0009412, &(0x7f0000001700)={r2, 0xfffffffffffff001}) sendfile(r3, r1, &(0x7f0000000040)=0x40, 0x100) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f0000002700)={r5, 0x9, 0x8}) prlimit64(r8, 0x8, &(0x7f0000000540)={0x0, 0x30000000}, 0x0) [ 155.099476][ T1051] Bluetooth: hci1: command 0x040f tx timeout 19:52:16 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) write$dsp(r0, &(0x7f00000000c0)="60f4411b812dcbd0f2fdea3a4cf57ff703888dd6aa7beb02a45d379777773d6eb28a23ab873a5df547df4822772bef42aca81fa4d3b92c6d89243e74d8670474c990adf2cff0e9448a0eb53f27a0fc7d3dd6b3d56f021ea92e0f7358a27df047ace6d833197ec164707a6d790b60a1d64e666031e7223bff49de04a2e9280c12b31b68ea045bcc0c1f0efe1bb4e99d9b370ef716ed9e6d17321c368c2a7e282480f57a3fdf4f015eeb14f531aaf96d2a5fd5d239c1ef428291627b2c8194c2", 0xbf) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:16 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 155.367628][ T9557] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 155.457844][ T9570] overlayfs: missing 'lowerdir' 19:52:16 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x1, 0x2, 0x8001, 0x400, r1}) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:16 executing program 2: mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)=@in={0x2, 0x4e22, @private=0xa0100fe}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="adda7f2cc51d9b19cd324c89d89f9b5a4f530d306e38e3db267c8a4d8c9d02a54586afde2f5bde7d09d9e484755c5a6afbdf813754e2d33b3f2cc4f357e4c09824e9917cc6859aa6d92682491e75bef7f0328d99132f954e120660060e703c6d3d8aa9b1aab2082c142cfcdbe0740b80bf4a768e0311590f99f38400a05f858d99801aab6b5b70e4a72600d90a37a65e5282cde2b9e966391a36c82a1e1616eeec56212e11c21791cb98c2ee21160cf127a146bb7d6fd770b41ce9c365f3a17c1279a4a861cb5d2d96a03a3e2a4f5a3c6e10c87df6542e685f728ee8774144554fc0aa53f25ec1214861a3bf5a", 0xed}, {&(0x7f00000003c0)="d7906fe2dc99c3cba7f3887ef5681893c39217357e5d4e", 0x17}, {&(0x7f0000000400)="76b6cc300b06a22b07b059f45d82e00573a7db2ebd855ab447fa01a9c45caceaf9f91df2cbebf445665f5c9dfb8a941d46e536fee1e572d494a6f2742265cd03903279f6a22237678b0b012feeb30af5012120fbfbcc6f8217c80236299834ef6aa9e40fd56ee47f809df1b9e4b392f1258b5499f77b5eb1554bb6fef690e995b22a83adf82d1f8616885b88b27a54e995ef10e7e5a206bac0cea135954913ad63", 0xa1}, {&(0x7f00000004c0)="b5025e35d8a9626f00e894a6d1b323783e5c5337fc", 0x15}], 0x4, &(0x7f0000001e40)=[{0x98, 0x1, 0x4, "fb2525cf087b40ef0e11dbdfd973b8b8a2a9d4af94a5235cfcc312a56baf26bb62f41f79df0d515adcf7e2fa392128ab581b016a2b325535c644baf0f7b3118407fa42fa612ecc66dc57c976a39cb1047318b718667213f9e1aa7ed6c8b53d61e07abcfc875aab45e790b69cefadd348a491f36e7fd3fb55d5531318bede5fd35914e553761ef444"}, {0xc8, 0x0, 0x3, "9451289c48bce5567fd9c1bb554a1f7cb38601e5125015bf3df747e7b41bf5935eaff8d036ed8d77769ae8ae04f35adfe9a92d8a3935bdae880a0e44461d16b103dd0df62f8ca0d633b465ceded5d49454d3fd3784a84f74b472f00a82f38c08e7835c6b9b15159081b2272ff9fda7cac6ff3762d373619e0e47b0ce684e0815d1912a7960e7150feae51680d20a3b6f8c8e99fbde3d92c4ed30bb819e12128322313bf79f1cf29fe503104513504d9fd77fd902a20951"}, {0xb8, 0x111, 0x2, "a4c5bf5c62061695f3c6fed81f143b95ae6d94db736b6f92f5170d0a8d218acdae5b497bf4a68a4f10608cc5aad91474d007439ea3495ed20981d7722265714963b1c56212e67ee82a18180b867c0468ee45861f28c159fe5b077f40b0ff6776b530c642be3a0fb85be912d2a9615bf3bb4df45aca0bd45cac99c99377c7ee86db1d50ef07384de00100b1677e85a1bd040cfcaa3982a1f853af609b4d58ec5d560927"}], 0x218}, 0x24040082) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) close(r0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r1, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x3, 0x8, 0x7, 0x4470, 0x3, 0x3e, 0x80000001, 0x32a, 0x40, 0x1a5, 0x8abd, 0x80, 0x38, 0x2, 0x60, 0x1, 0x1000}, [{0x2, 0x800, 0x6, 0x1000000000006, 0x6, 0x8, 0x81, 0xffffffffffffffff}], "f70dbc4b547b63227701e454565c7c6203dedf10e130c7484dab814a999a7e8b9854ac05a40e4aa594958feb84f6975108fd172c49bf11883b379dbf28baf9801e0c3cd6f0ea4131cf356b0ab0466b83f66adad275ff3600c36e06a991d7a9eb8ba95b6ccf5db96d3816121ad61f8abd838ad4cb710a37b38ed415d538a196e885b557176ee00c65769f38607a7029ebe15b5562ada62386b2dbda13d6a2b0af471d287a5d8b6ed439d9db7deb4a04d40371837018defd6c31069fc070889cf20a92b588d66b3b7ecdba8de771c7ae16af906bc45a155abff0d4c9202aec5d1ccc50c4cde11721c3b781ddf85894c9a739033257d78fd677f76c9f44118d3a2da4a5dc705e58c6c4cd9cf75b654a1d3e8f4399f020729ddb4cf6884a8f36a34e10def28e2b6b5d6c0275995a51b4029171dc65a1731fcf80360b31f02af2b69806969cf54da2ea5adaaaa0fd8d756a877133ef83c1f0d2aa57b782dd2efbf285bd1aea4fb8278d7cf51eae12cd2333724629ab297e6de62ea440b0df027be00073d06067b0121a4a4d9bf4b8d793d1a2191703759fe4209b2d2334cda8fe6d6b484cc7856404fbfd5e270f0b0f83e43540e85131e873e96c09cbbce3ce48f222e734ea58184f7ae5ada59eb8120526c34235e375d66a0096ddb9ae06e727266bc51b02ec0b2d6311db2afeb22cb278ecc847613edeee4c9cdc96a6ecc21a1b9edf38a9bca3facdfcec69576e2b38fa589385441c996df9dd31dc409947f251a1b286055a099d452286f7852b5d7e52a57c1e32b476ef9de7d50c8cb8289f671ebd2defd2dac4a9b612e2eadc61e5e10a2c785b7c93f5632f4bc8c6300fffc562942d7e44ff241249ab3c0bd83aaa5df6649d2acc7f7f6fdb28766948ad4baecbc7f22e4f38c8127ac3332c35d699cce8fd8afcaa27c19a5682ea5b1c72d013efaf56eef460e015f0d0982de514138163d5221e3d859a05bf6b65d0a1e2b86f6fde9b55208fa1e121831ce69302580575acbc005b634f0208b9c27bd65aa9edab78994c5255e3d07735151a2876101208c61a7daf922fb415ecb63dd555dd61c009f1c2bfc94dc38675b8139237c6ef1f0f63a9c29ba066fe028c29c8f6c82a04ea490d1a88d4ecc697bfc4b160f50900321d4b5f70635d35f74f17af17ba9b1ef640ec13cc98b35469b305e44df146a121f084c662b03ca122b226fb699b1385af08e9b9d559ba31cc42242c7b2d3e55a62e1d9fb79d005f4034869a0fdef96ed4572b5537ddec7250c1d1bafdafdc20a72c93a16f07494986f52456278d32d37f9a80494c111c750022e8e891dd5885229ed9afe4328a6da752765be107993f7dc071d7651317fadd1a789dc4162bb5998ac5d38e75cf856234fbe80ee25879460d23b06e7d9950a3ad7b52692b4c07c37c0feb37767efd9a69e3c226e47b5a548ea0e2b48e2c123cfcc14d583912a2a95b23aa33b3bacc52329be1da29e9d654fabbc111158513a3a0443ccd1d8b6c39cebfe485896bc98046c5abd88761ce1c3509578dd375385ff602446290a66366587fca0218348feb0fa0c7ff699025d9cbad27c02fac280a7a20523363f3a70bf3248226ce37eb0e0cdc6b1ecccef0dbab89263cfcbf8656c65fe3196284768d060ca245d4c4c17fdc7af95964ce9a4d97ff6d6618be5b2b71d1853c08975e4cda16133fb041683ec753f7e85740edb2a0e3d9d4f77c36a9b32bb1063ffdfddca78cf157d4ee3f71466225e973e1f2a8c7d9fe9ca0f093b98e69d282dbcb560442b74a7208d41b3bfec9ee237d1afb5eb17070cc4d664f95c74ff7d5a847517d73cb257db94d98780d9da406c8a9f13efe7cb24b14d53de838c59e3ae09f969355561e11141e3ed61f779ee5bbc80406862115c85500a0de9a6e3cbbeb9027e99ae49c8641e962ee9dcb5721c451b05428174918c59faa48ffa2d78eef88a089828e49c7272dafb43343161a5e68def0190ead571295ceaad2be3d6027cd010e260bf98a9a31b7d66e76779eb4817ab7791ad83af8292d7584c1c7ea9f05f08ad25e611ea2bae10d526c3b214f8e46673593ec6df9e20dab62f4cf2426ace71cd0409a76d456bd6a304e3b8f00add15408fdc4ce43473e0142015fd4c693891f3c694906e5ea7788dde5905fb4af4af0848c035c8f7ed53e23e75bcc7c033d9a386155a356ba0ea10c2330fe6ee8c412ef4a313895b42bb3f0ab62ba317e427b03d20a281b9a3771e420d4819359e5a3b606c49caa65c1ec5171e0ca32c28c801672598b47529a0ac15c95203746e4b6897c992bb353265eb0eb24913466fa0b77d24bfcd291f1dce3e17d0078c6dd9a4544a05e4c3ad14ff9701033a6cba1adb0fd9336c2db1515707d97c4c2f6e936187d98cdffd391aed9b2d8074418e7d337441df16f88143d164cc1307bc5dfbb38fa1f90cbcbc45c2ea4a09f15f7993a8cb8babba4e5f01a87cd129cf3178892a5f77c97365bad83c914679d14773bd861aa42989304c61b7c3b5ac4a260e1201eaacf61c44115e859632299f613fb240798ccb49df7bc9c921bcfb20c69b5de7e11354d1f8d63c1ccbd2a6ffb6cc56c9fe1a10626d42572161594d59c24270955016eab19ae54c6dab6a3af4ce95e285b0178cd71c6a0c0b540955ee42d203ef1863fa6f296e86159b8323e6789c35882aefa53784ccc33fc55f1ed3a25a4f8872a1e60d20f7a2aa2821b5da00e5932f16355b47d8b11f0c69856ccfcaad128cfc5c6e83662baaf83ac398255e9df831bb404d9b661c22f7930d49d59f56c10ea805ce29019d014dfeddbb0b91b4f614a81c146bd7a80f89f44bfff07f3e8b248390fcd50738fc3d9c52e3a69f525af9d9f8117c8ee311bfa41b21c1e8f2fb4f339e53ac2c17a4bdc4326faca93ebb47f80c8721ba54f6755948471273d7b31b8f406c596aba21e916140f55ff385861e188709a3ddf7940f074d2a1dcdc1cd6963afe44d65d6677376ea5b69254363739e075495903631ac6b15585e97dae3b45e5d084b4605c4a7110c116121c7599f462a95610037f4858ab7a1262c9bb3a3b3e78f08a4ffbcde5e10226b7ca1a8cb91523afa09815e4b7603afb785b21038b50000193e776362a762888f892be89b28510d3bd06d7b0c19cd71c939a06800b5dfb72cddc0721a9dc209035300e4e3357d2e7482f6b4f55cee537797b694a6eae00e818fca7968af7866caa9a198b0dc6fd1a8668800417089f030532b3d2d366c80ea5a9c0aced349f734066266f9102a54c3d7fe90989d74a1c0a94f23ae9e10943de0017d0cf6349969c17707e973afabaa87c52aeba3fe340ce8862b7d9bafbe645160c1a877a561a258a52278acfc43e9148052a3ce3a8dbc4a46620d4200cc95aa799094ce050c6c5abce27b8013fbff07e398e076c4197b17ff456ad4944923c5c204b2aff9b20dec983b9444b90d642d1615d17333ac479286f6aa3a3c6ce94ed05c15ee26509915ad0d11b18371c6baff2da3f70647b5b0c71c6fdacf43a42332c6343e5734fa8c922217fa085804f810bcc80b8bfc2ea84c870e02954f3eefad983611ba8e62d0c9a7f8fb9e5d99927f9011be7c75109cd1705d76c4a53463160cac7bf3dfda10d747f2310f23e2ad89153ba370a2eca1164ce756f2bb6e93ebde7e734e2ebc100b99a470e4ce0ebdd8a1c2ccf53b8d5173c040f840001e3a4b9eef1ade6729319724caffb278ac966c5a025a94c3f1d10d985c5de7be04645f5c96c9c90520a7fec5e2d6b51c72e512cf2519402d4ae78b74d68246a9a6a22674fa206c240d019e1e5ef2de37271a59d20cffda177fceb9029e442906733a95898bbbcf9cd18af6f995b28ed1fd20807dc82b4785e873f8626c6fb9cfb8cc7ea63eaf0968687d09666399703044db17b851ebdf7e61964035d6fe8a10fc04b5ef1ad82ef679d0511719613c9059bf4df80f3ac0711414e0025df8fbb89b11f5e13874470bfe3b846d99af84ff76a1de222579ecbc187a79d8fcd2e93c01a21fa4b3fdac74f5ec86f9826585673e6447e03a6dc7c5c673a4b183857e655dd93741513a32bfe42ee9249cb0cae966a73a8c0e790a0fbb556fc45a37809dd348a13a2d4c51c9c9533707a886b1aa9502f5f7fa0b6a89ae6fcbac63f26af2fc74621ec559b2a9eec2ee74e8852df1306bcc1118f855780c932c1bb90eb0438987dc014ab1617d6f25f131af9b87131bf38d3857c6488be717ed033c957e247c76b0154bcd37b3dfa45574e37f6ab9d69b645e1d03c8858068c3733bf7e393f607e0c9674a9ded6afad1d47a8f0cee3e131a86634e84758900c6fb5156cd25df2a1b63e7358b5987c121f2b4e06ac2729b3e98d93ebbfdbbc558f44768f32823a96812617daee649ab9d91d2042aed35115fe8b03efadb1c427495fb18b4c456ebfd7df1f5fc29968f1a9dac21e218f8dd694800cdb0435cb69f479b6155fe4c7db3e7080158e41f929c61f66a5b624a5c5edcde9eee3e6bdfa01e5d9b42203d80e0746b483a2799ba08701c48c179b0d51524ebba943ffa62822e6c28854c2b7b0abb2cf75f7eaaa4b8f71b6b875cd9f5e2df5cde74524e7cbd4d8f96598b777a4f230220cb6932e6ddcfdaf1b1f0098e45d62e8cfb829a6a192cf62928115bfc105e7f8927d6861e8622651a2f0aae50d9ecc942611dbc24fd7018a3967f28d49ca54232eb560080f95bade028ca465fa7e38e2eba73cc7f238d616eaf228ef1417d48e3a6247ac42cbc8db79937043a61b9fe41fc0f7d89e0738f5d1527f2ea0179c0de3573ab6e598ef637a90e83a4e40db7b266103d76927896a8da7e2aedbfa2bd47d8af7fe02338f61f61cca02a9fd961f4be715f996a9833e0a65c056a0111da8a12e42bf1d82283e303808584611be1320e009b3e6c8bf59bae1e52e816665f1d7a796ee4861fde3711ecf36608183436061bd41969132f9b095aa57a30102baea73ea5868466d44141ef8d6d724a2e6daa7ad8fe9340c244e4ae656cad0a30e035e94488de01b1241b587d270e2957d4013469b33a4031165db8928b51249d2abfd143ad56ac0b9fb7b173b60df46c8bbdd36eed8436f12c05a441f775f3b1c6e1991722f4060ccc2786bef34f5e801169278c3e3768b3704a8f3fe504c9049c2f670a4e5e5b029c4b543a0c7164c84554bf737169abe4c45d88399f07cb42430beed25e684658006a4d19688698e078449374d7d46aa1e9488475093d01570fdb071cfc2a3d9d5ecddb6e6452b150d4652f26a086d43b38a75a6c82025311de5ba490b5db18add7b4a6fbbc3117330f61d62f0e2b218034355d69a74d101a8c1b26ad707b607d8afe53b703570eae19ec121e45a5e10216617e706ee1dd9369944434e06eaf8983be95837a9098c5c420304cc6b74b29377047d487e33a20b753acd922ab55acb87237ae746aae02127c0e4e00fbe543642b2e2cc2d90f1537f4f0b94bbc5e28a31d0f3386cda37fac487c04314eea3034dd8383ce52cfe8a8e7f04513619d82e37bf9df19d2cd0b66b9eb8b07bf77ff991c7429d7b2b496b49c543f6dcd178c0c8fa4e8e08395fafdb6d86df5ebcab50822f93e5be6ce7c879cbf57a19362213a214dbfd6c33b43531f5891fd6fba9ab386c0c56fde138f8647109d802e7d0ce4472bfe5090ba0578ef981b222d71c18756de93ba5eee5e0bbee0b752472241e201d6880980ae05d9fd7abf1809af4023e703bdb8153199c0fd1704f76829c50697e603d18ac310a1693083a06c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1878) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000580)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000002080)=0x7, 0x4) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2012, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fallocate(r0, 0x16, 0x57, 0x9e3) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000020c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf255a00000008000300925c791da86bab927d2b3f6aaff58bc6ca1d7f9e331dce60587f00d3402fc61045e0202abb64fe10dc0c294ef0aca808bd5b773b55ca728e4949301e1fed1b8bf89ded8bad42fcfa1295f7399735ed", @ANYRES32=0x0, @ANYBLOB="0c009900feffffff38000000"], 0x28}, 0x1, 0x0, 0x0, 0x4c180}, 0x40841) 19:52:16 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:16 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:17 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) chdir(&(0x7f0000000540)='./bus\x00') 19:52:17 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:17 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:17 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:17 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) 19:52:17 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:18 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:18 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 157.024325][ T9610] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:18 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 157.099101][ T9617] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:18 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:18 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 157.165903][ T9610] overlayfs: missing 'lowerdir' [ 157.171167][ T5] Bluetooth: hci1: command 0x0419 tx timeout 19:52:18 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) ftruncate(0xffffffffffffffff, 0x9) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 157.277180][ T9634] overlayfs: missing 'lowerdir' 19:52:18 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) 19:52:18 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:18 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:18 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:18 executing program 3: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:18 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:18 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:18 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:18 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 157.969051][ T9660] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:19 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) 19:52:19 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 158.079082][ T9670] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 158.093080][ T9660] overlayfs: missing 'lowerdir' 19:52:19 executing program 3: socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) [ 158.222105][ T9682] overlayfs: missing 'lowerdir' 19:52:19 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) 19:52:19 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) 19:52:19 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) 19:52:19 executing program 3: socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:19 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:19 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:19 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) 19:52:19 executing program 3: socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:20 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:20 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) 19:52:20 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) [ 159.034460][ T9712] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:20 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 159.087040][ T9718] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 159.211368][ T9735] overlayfs: missing 'lowerdir' 19:52:20 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) 19:52:20 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:20 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000001900)="414fcec3147aa41b656819e1ff9ec51a510eda14fada8995e9aa8f286993b2d5655a90b4fbfb508cf88b67746d26bcb9b14203f665aab50177b443472bd1c60e13f919c30f7c3df1d6a9d5f1de70dc974c76945bd518328a6555ca5eae7d47f76b", 0x61) 19:52:20 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) 19:52:20 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:20 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 19:52:20 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) 19:52:20 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) 19:52:20 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 159.970170][ T9763] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:21 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 160.015567][ T9771] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:21 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) 19:52:21 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 160.183995][ T9790] overlayfs: missing 'lowerdir' 19:52:21 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:21 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) 19:52:21 executing program 3: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:21 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:21 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:21 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) 19:52:21 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 160.918623][ T9821] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:21 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) [ 160.967588][ T9824] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:22 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) [ 161.090990][ T9831] overlayfs: missing 'lowerdir' 19:52:22 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 161.153869][ T9835] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:22 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:22 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 161.254362][ T9841] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:22 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:22 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:22 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:22 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:22 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:22 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 161.817069][ T9869] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:22 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 161.875171][ T9875] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:22 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:23 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:23 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:23 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 162.145238][ T9889] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 162.197967][ T9890] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:23 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:23 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 19:52:23 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:23 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:23 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:23 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:23 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 162.730956][ T9919] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:23 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 162.834797][ T9924] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 162.844493][ T9927] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 162.869568][ T9926] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:23 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:23 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:23 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) [ 163.160329][ T9952] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 163.201410][ T9955] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 163.231126][ T9956] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:24 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:24 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:24 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:24 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:24 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:24 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:24 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 163.719403][ T9969] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 163.737822][ T9973] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:24 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:24 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:24 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 163.889565][ T9980] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 164.070797][ T9995] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 164.153101][ T9999] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:25 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:25 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:25 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:25 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:25 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:25 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:25 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:25 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 164.814383][T10015] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:25 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:25 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 164.909315][T10019] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:26 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:26 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:26 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:26 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 165.171954][T10034] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:26 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:26 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:26 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:26 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 165.403764][T10046] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:26 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:26 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:26 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:26 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:26 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:27 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 166.074893][T10080] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 166.140363][T10084] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:27 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:27 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 166.592240][T10108] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 166.610053][T10107] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:27 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:27 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:27 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 167.062315][T10134] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:28 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:28 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:28 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:29 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:29 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:29 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:30 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:30 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) 19:52:31 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:52:31 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:52:31 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:31 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:52:31 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 19:52:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:31 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:31 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:31 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:31 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:31 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:32 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:32 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:32 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 19:52:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:32 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) 19:52:33 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:33 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 0: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:33 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 0: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:33 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:33 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:33 executing program 0: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:33 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:33 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 19:52:34 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:34 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) 19:52:34 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:34 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:34 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:34 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:34 executing program 2: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 19:52:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:34 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:35 executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) [ 174.124080][T10645] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:35 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 174.236257][T10655] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:35 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:35 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) 19:52:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 174.516938][T10670] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 174.526029][T10671] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) [ 174.578757][T10673] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:35 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 174.685313][T10682] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:35 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:35 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:35 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:36 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:36 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:36 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:36 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(0x0, 0x0, 0x4) 19:52:36 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:36 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:36 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) [ 175.297856][T10710] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) [ 175.357090][T10713] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:36 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:36 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:36 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:36 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:36 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 175.535553][T10723] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:36 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) 19:52:36 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) [ 175.766211][T10733] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 175.769717][T10731] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:36 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 19:52:36 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:36 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) [ 176.058811][T10746] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 176.061511][T10748] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:37 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) 19:52:37 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 19:52:37 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:37 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) [ 176.444635][T10758] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 176.473972][T10759] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:37 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 176.541796][T10761] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:37 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) [ 176.637373][T10764] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:37 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:37 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:37 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 176.805095][T10774] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:37 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 176.881610][T10775] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:38 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) [ 176.964378][T10779] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.077082][T10783] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:38 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:38 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:38 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) 19:52:38 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) [ 177.402873][T10800] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.414745][T10801] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:38 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x5, 0x84) [ 177.526459][T10803] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:38 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:38 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:38 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:38 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) [ 177.729692][T10807] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.735029][T10811] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.835507][T10812] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.873081][T10811] overlayfs: missing 'lowerdir' 19:52:38 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) [ 177.897646][T10813] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.930327][T10817] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 177.950691][T10821] overlayfs: missing 'lowerdir' [ 177.962803][T10820] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 178.010295][T10813] overlayfs: missing 'lowerdir' [ 178.063864][T10825] overlayfs: missing 'lowerdir' [ 178.076257][T10824] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:39 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:39 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) 19:52:39 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) [ 178.683363][T10834] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:39 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) [ 178.792214][T10837] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) [ 178.865380][T10842] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 178.917469][T10841] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 179.037901][T10847] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 179.067996][T10850] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:40 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) 19:52:40 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 179.499181][T10862] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:40 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:40 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:40 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:40 executing program 4: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:40 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:40 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) 19:52:40 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 179.905889][T10881] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:40 executing program 0: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:41 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) [ 180.038673][T10894] overlayfs: missing 'lowerdir' 19:52:41 executing program 0: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) [ 180.100593][T10891] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value [ 180.236795][T10904] overlayfs: missing 'lowerdir' [ 180.238626][T10901] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:41 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7f6572b9a53ab16469723d2e3a66"]) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) creat(&(0x7f0000000280)='./bus/file0\x00', 0xa0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX]) mount$overlay(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f00000005c0)=ANY=[]) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) 19:52:41 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 180.341743][T10908] overlayfs: missing 'lowerdir' [ 180.354443][T10906] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:41 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 180.487142][T10916] overlayfs: missing 'lowerdir' [ 180.506455][T10915] overlayfs: unrecognized mount option "loeršĨ:ądir=.:f" or missing value 19:52:41 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 180.615395][T10922] overlayfs: missing 'lowerdir' 19:52:41 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:41 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:41 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:41 executing program 1: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:41 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:41 executing program 5: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x7e, 0x0, 0x3, 0x9, 0x0, 0x6a6, 0x80408, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0xffff, 0xf8, 0x3, 0x9, 0x4, 0xe73, 0x0, 0x8000, 0x0, 0xd}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:42 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) (fail_nth: 1) 19:52:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) (fail_nth: 1) [ 181.147197][T10956] FAULT_INJECTION: forcing a failure. [ 181.147197][T10956] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 181.202932][T10956] CPU: 0 PID: 10956 Comm: syz-executor.4 Not tainted 5.15.0-rc6-syzkaller #0 [ 181.211894][T10956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.222206][T10956] Call Trace: [ 181.225480][T10956] dump_stack_lvl+0xcd/0x134 [ 181.230092][T10956] should_fail.cold+0x5/0xa [ 181.234605][T10956] _copy_from_user+0x2c/0x180 [ 181.239290][T10956] __sys_bpf+0x311/0x5df0 [ 181.243630][T10956] ? bpf_link_get_from_fd+0x110/0x110 19:52:42 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) (fail_nth: 1) 19:52:42 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) (fail_nth: 1) [ 181.249090][T10956] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.255074][T10956] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.261236][T10956] ? find_held_lock+0x2d/0x110 [ 181.266022][T10956] ? trace_hardirqs_on+0x38/0x1c0 [ 181.271054][T10956] __x64_sys_bpf+0x75/0xb0 [ 181.275560][T10956] ? syscall_enter_from_user_mode+0x21/0x70 [ 181.281457][T10956] do_syscall_64+0x35/0xb0 [ 181.285872][T10956] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.291856][T10956] RIP: 0033:0x7fd1238b3a39 19:52:42 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 181.296263][T10956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.315865][T10956] RSP: 002b:00007fd120e29188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 181.324301][T10956] RAX: ffffffffffffffda RBX: 00007fd1239b6f60 RCX: 00007fd1238b3a39 [ 181.328513][T10967] FAULT_INJECTION: forcing a failure. [ 181.328513][T10967] name failslab, interval 1, probability 0, space 0, times 1 [ 181.332435][T10956] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 0100000000000000 [ 181.332452][T10956] RBP: 00007fd120e291d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.332466][T10956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.332480][T10956] R13: 00007ffd6a525b1f R14: 00007fd120e29300 R15: 0000000000022000 [ 181.384259][T10969] FAULT_INJECTION: forcing a failure. [ 181.384259][T10969] name failslab, interval 1, probability 0, space 0, times 1 [ 181.401728][T10969] CPU: 0 PID: 10969 Comm: syz-executor.1 Not tainted 5.15.0-rc6-syzkaller #0 [ 181.410627][T10969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.420866][T10969] Call Trace: [ 181.424140][T10969] dump_stack_lvl+0xcd/0x134 [ 181.428738][T10969] should_fail.cold+0x5/0xa [ 181.433417][T10969] ? getname_flags.part.0+0x50/0x4f0 [ 181.438797][T10969] should_failslab+0x5/0x10 [ 181.442539][T10971] FAULT_INJECTION: forcing a failure. [ 181.442539][T10971] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 181.443298][T10969] kmem_cache_alloc+0x5e/0x390 [ 181.443335][T10969] getname_flags.part.0+0x50/0x4f0 [ 181.443361][T10969] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.472506][T10969] getname+0x8e/0xd0 [ 181.476506][T10969] do_sys_openat2+0xf5/0x4d0 [ 181.481103][T10969] ? build_open_flags+0x6f0/0x6f0 [ 181.486219][T10969] ? __context_tracking_exit+0xb8/0xe0 [ 181.491684][T10969] ? lock_downgrade+0x6e0/0x6e0 [ 181.496538][T10969] __x64_sys_open+0x119/0x1c0 [ 181.501219][T10969] ? do_sys_open+0x140/0x140 [ 181.505818][T10969] ? syscall_enter_from_user_mode+0x21/0x70 [ 181.511721][T10969] do_syscall_64+0x35/0xb0 [ 181.516140][T10969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.522042][T10969] RIP: 0033:0x7fa9c43eea39 [ 181.526457][T10969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.546068][T10969] RSP: 002b:00007fa9c1964188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 181.554483][T10969] RAX: ffffffffffffffda RBX: 00007fa9c44f1f60 RCX: 00007fa9c43eea39 [ 181.562453][T10969] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000680 [ 181.570416][T10969] RBP: 00007fa9c19641d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.578376][T10969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.586430][T10969] R13: 00007ffd1d82addf R14: 00007fa9c1964300 R15: 0000000000022000 [ 181.600043][T10971] CPU: 1 PID: 10971 Comm: syz-executor.3 Not tainted 5.15.0-rc6-syzkaller #0 [ 181.608825][T10971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.618883][T10971] Call Trace: [ 181.622156][T10971] dump_stack_lvl+0xcd/0x134 [ 181.626745][T10971] should_fail.cold+0x5/0xa [ 181.631245][T10971] _copy_from_user+0x2c/0x180 [ 181.635926][T10971] __sys_bpf+0x311/0x5df0 [ 181.640347][T10971] ? bpf_link_get_from_fd+0x110/0x110 [ 181.645730][T10971] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.651798][T10971] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.657801][T10971] ? find_held_lock+0x2d/0x110 [ 181.662674][T10971] ? trace_hardirqs_on+0x38/0x1c0 [ 181.667695][T10971] __x64_sys_bpf+0x75/0xb0 [ 181.672108][T10971] ? syscall_enter_from_user_mode+0x21/0x70 [ 181.677995][T10971] do_syscall_64+0x35/0xb0 [ 181.682399][T10971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.688371][T10971] RIP: 0033:0x7efe5db45a39 [ 181.692774][T10971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.712457][T10971] RSP: 002b:00007efe5b0bb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 181.720859][T10971] RAX: ffffffffffffffda RBX: 00007efe5dc48f60 RCX: 00007efe5db45a39 [ 181.728815][T10971] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 0100000000000000 [ 181.736776][T10971] RBP: 00007efe5b0bb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.744733][T10971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:52:42 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 181.752778][T10971] R13: 00007fff5040026f R14: 00007efe5b0bb300 R15: 0000000000022000 [ 181.760758][T10967] CPU: 0 PID: 10967 Comm: syz-executor.0 Not tainted 5.15.0-rc6-syzkaller #0 [ 181.769694][T10967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.779743][T10967] Call Trace: [ 181.783015][T10967] dump_stack_lvl+0xcd/0x134 [ 181.787613][T10967] should_fail.cold+0x5/0xa [ 181.792112][T10967] ? getname_flags.part.0+0x50/0x4f0 [ 181.797751][T10967] should_failslab+0x5/0x10 [ 181.802424][T10967] kmem_cache_alloc+0x5e/0x390 [ 181.807285][T10967] getname_flags.part.0+0x50/0x4f0 [ 181.812582][T10967] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 181.818573][T10967] getname+0x8e/0xd0 [ 181.822472][T10967] do_sys_openat2+0xf5/0x4d0 [ 181.827153][T10967] ? build_open_flags+0x6f0/0x6f0 [ 181.832184][T10967] ? __context_tracking_exit+0xb8/0xe0 [ 181.837822][T10967] ? lock_downgrade+0x6e0/0x6e0 [ 181.842677][T10967] __x64_sys_open+0x119/0x1c0 [ 181.847355][T10967] ? do_sys_open+0x140/0x140 [ 181.851949][T10967] ? syscall_enter_from_user_mode+0x21/0x70 [ 181.857934][T10967] do_syscall_64+0x35/0xb0 [ 181.862425][T10967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 181.868325][T10967] RIP: 0033:0x7fe35f4ffa39 [ 181.872833][T10967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 181.892529][T10967] RSP: 002b:00007fe35ca33188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 19:52:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) (fail_nth: 1) [ 181.900941][T10967] RAX: ffffffffffffffda RBX: 00007fe35f6030e0 RCX: 00007fe35f4ffa39 [ 181.908913][T10967] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000680 [ 181.916881][T10967] RBP: 00007fe35ca331d0 R08: 0000000000000000 R09: 0000000000000000 [ 181.924851][T10967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.932996][T10967] R13: 00007ffee350766f R14: 00007fe35ca33300 R15: 0000000000022000 19:52:43 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) (fail_nth: 2) 19:52:43 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:52:43 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) (fail_nth: 2) 19:52:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) (fail_nth: 2) 19:52:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) [ 182.097672][T10987] FAULT_INJECTION: forcing a failure. [ 182.097672][T10987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.144396][T10985] FAULT_INJECTION: forcing a failure. [ 182.144396][T10985] name failslab, interval 1, probability 0, space 0, times 0 [ 182.183660][T10985] CPU: 0 PID: 10985 Comm: syz-executor.5 Not tainted 5.15.0-rc6-syzkaller #0 [ 182.192454][T10985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.202508][T10985] Call Trace: [ 182.205783][T10985] dump_stack_lvl+0xcd/0x134 [ 182.210382][T10985] should_fail.cold+0x5/0xa [ 182.214888][T10985] ? getname_flags.part.0+0x50/0x4f0 [ 182.220359][T10985] should_failslab+0x5/0x10 [ 182.224867][T10985] kmem_cache_alloc+0x5e/0x390 [ 182.226287][T10998] FAULT_INJECTION: forcing a failure. [ 182.226287][T10998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.229641][T10985] getname_flags.part.0+0x50/0x4f0 [ 182.229670][T10985] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 182.229699][T10985] getname+0x8e/0xd0 [ 182.229723][T10985] do_sys_openat2+0xf5/0x4d0 [ 182.262375][T10985] ? build_open_flags+0x6f0/0x6f0 [ 182.267406][T10985] ? __context_tracking_exit+0xb8/0xe0 [ 182.272872][T10985] ? lock_downgrade+0x6e0/0x6e0 [ 182.277732][T10985] __x64_sys_open+0x119/0x1c0 [ 182.282497][T10985] ? do_sys_open+0x140/0x140 [ 182.287093][T10985] ? syscall_enter_from_user_mode+0x21/0x70 [ 182.292996][T10985] do_syscall_64+0x35/0xb0 [ 182.297415][T10985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.303314][T10985] RIP: 0033:0x7fdce6583a39 [ 182.307817][T10985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.327425][T10985] RSP: 002b:00007fdce3af9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 182.335835][T10985] RAX: ffffffffffffffda RBX: 00007fdce6686f60 RCX: 00007fdce6583a39 [ 182.343807][T10985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000680 [ 182.351775][T10985] RBP: 00007fdce3af91d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.359738][T10985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.367703][T10985] R13: 00007fff2a3450af R14: 00007fdce3af9300 R15: 0000000000022000 [ 182.375687][T10998] CPU: 1 PID: 10998 Comm: syz-executor.1 Not tainted 5.15.0-rc6-syzkaller #0 [ 182.384457][T10998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.394507][T10998] Call Trace: [ 182.397777][T10998] dump_stack_lvl+0xcd/0x134 [ 182.402366][T10998] should_fail.cold+0x5/0xa [ 182.406855][T10998] strncpy_from_user+0x34/0x3e0 [ 182.411699][T10998] getname_flags.part.0+0x95/0x4f0 [ 182.416804][T10998] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 182.422779][T10998] getname+0x8e/0xd0 [ 182.426752][T10998] do_sys_openat2+0xf5/0x4d0 [ 182.431329][T10998] ? build_open_flags+0x6f0/0x6f0 [ 182.436563][T10998] ? __context_tracking_exit+0xb8/0xe0 [ 182.442038][T10998] ? lock_downgrade+0x6e0/0x6e0 [ 182.446883][T10998] __x64_sys_open+0x119/0x1c0 [ 182.451555][T10998] ? do_sys_open+0x140/0x140 [ 182.456135][T10998] ? syscall_enter_from_user_mode+0x21/0x70 [ 182.462110][T10998] do_syscall_64+0x35/0xb0 [ 182.466514][T10998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.472400][T10998] RIP: 0033:0x7fa9c43eea39 [ 182.476808][T10998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.496404][T10998] RSP: 002b:00007fa9c1964188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 182.504985][T10998] RAX: ffffffffffffffda RBX: 00007fa9c44f1f60 RCX: 00007fa9c43eea39 [ 182.513031][T10998] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000680 [ 182.521074][T10998] RBP: 00007fa9c19641d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.529316][T10998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.537385][T10998] R13: 00007ffd1d82addf R14: 00007fa9c1964300 R15: 0000000000022000 [ 182.547366][T10996] FAULT_INJECTION: forcing a failure. [ 182.547366][T10996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.565801][T10987] CPU: 0 PID: 10987 Comm: syz-executor.4 Not tainted 5.15.0-rc6-syzkaller #0 [ 182.574578][T10987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.584890][T10987] Call Trace: [ 182.588165][T10987] dump_stack_lvl+0xcd/0x134 [ 182.593026][T10987] should_fail.cold+0x5/0xa [ 182.597625][T10987] _copy_to_user+0x2c/0x150 [ 182.602155][T10987] simple_read_from_buffer+0xcc/0x160 [ 182.607623][T10987] proc_fail_nth_read+0x187/0x220 [ 182.612658][T10987] ? proc_fault_inject_read+0x220/0x220 [ 182.618205][T10987] ? security_file_permission+0xab/0xd0 [ 182.623755][T10987] ? proc_fault_inject_read+0x220/0x220 [ 182.629300][T10987] vfs_read+0x1b5/0x600 [ 182.633460][T10987] ksys_read+0x12d/0x250 [ 182.637702][T10987] ? vfs_write+0xae0/0xae0 [ 182.642122][T10987] ? syscall_enter_from_user_mode+0x21/0x70 [ 182.648023][T10987] do_syscall_64+0x35/0xb0 [ 182.652443][T10987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.658342][T10987] RIP: 0033:0x7fd1238665ec [ 182.662757][T10987] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 182.682366][T10987] RSP: 002b:00007fd120e29170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 19:52:43 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 182.690781][T10987] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd1238665ec [ 182.698755][T10987] RDX: 000000000000000f RSI: 00007fd120e291e0 RDI: 0000000000000003 [ 182.706725][T10987] RBP: 00007fd120e291d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.714783][T10987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.722756][T10987] R13: 00007ffd6a525b1f R14: 00007fd120e29300 R15: 0000000000022000 [ 182.753586][T10996] CPU: 0 PID: 10996 Comm: syz-executor.3 Not tainted 5.15.0-rc6-syzkaller #0 [ 182.762492][T10996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.772552][T10996] Call Trace: [ 182.775828][T10996] dump_stack_lvl+0xcd/0x134 [ 182.780430][T10996] should_fail.cold+0x5/0xa [ 182.784941][T10996] _copy_to_user+0x2c/0x150 [ 182.789626][T10996] simple_read_from_buffer+0xcc/0x160 [ 182.795093][T10996] proc_fail_nth_read+0x187/0x220 [ 182.800124][T10996] ? proc_fault_inject_read+0x220/0x220 [ 182.805674][T10996] ? security_file_permission+0xab/0xd0 [ 182.811226][T10996] ? proc_fault_inject_read+0x220/0x220 [ 182.816776][T10996] vfs_read+0x1b5/0x600 [ 182.820943][T10996] ksys_read+0x12d/0x250 [ 182.825199][T10996] ? vfs_write+0xae0/0xae0 [ 182.829621][T10996] ? syscall_enter_from_user_mode+0x21/0x70 [ 182.835608][T10996] do_syscall_64+0x35/0xb0 [ 182.840023][T10996] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.846188][T10996] RIP: 0033:0x7efe5daf85ec [ 182.850604][T10996] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 182.870560][T10996] RSP: 002b:00007efe5b0bb170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 182.878976][T10996] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007efe5daf85ec [ 182.886950][T10996] RDX: 000000000000000f RSI: 00007efe5b0bb1e0 RDI: 0000000000000003 [ 182.895012][T10996] RBP: 00007efe5b0bb1d0 R08: 0000000000000000 R09: 0000000000000000 19:52:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2, 0x0) [ 182.903070][T10996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.911038][T10996] R13: 00007fff5040026f R14: 00007efe5b0bb300 R15: 0000000000022000 19:52:43 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001c80)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x1}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:44 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:44 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3, 0x0) 19:52:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2, 0x0) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3, 0x0) 19:52:44 executing program 3: bpf$MAP_CREATE(0x100000000000002, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:44 executing program 4: bpf$MAP_CREATE(0x100000000000002, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4, 0x0) 19:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2, 0x0) 19:52:44 executing program 4: bpf$MAP_CREATE(0x100000000000003, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 3: bpf$MAP_CREATE(0x100000000000003, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4, 0x0) 19:52:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x7, 0x0) 19:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3, 0x0) 19:52:44 executing program 3: bpf$MAP_CREATE(0x100000000000004, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:44 executing program 4: bpf$MAP_CREATE(0x100000000000004, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x7, 0x0) 19:52:44 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) accept$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18, 0x0) 19:52:44 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4, 0x0) 19:52:45 executing program 3: bpf$MAP_CREATE(0x100000000000005, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 4: bpf$MAP_CREATE(0x100000000000005, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18, 0x0) 19:52:45 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18, 0x0) 19:52:45 executing program 3: bpf$MAP_CREATE(0x100000000000006, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0, 0x0) 19:52:45 executing program 4: bpf$MAP_CREATE(0x100000000000006, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 3: bpf$MAP_CREATE(0x100000000000007, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300, 0x0) 19:52:45 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0, 0x0) 19:52:45 executing program 4: bpf$MAP_CREATE(0x100000000000007, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0, 0x0) 19:52:45 executing program 3: bpf$MAP_CREATE(0x100000000000008, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x202) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:45 executing program 4: bpf$MAP_CREATE(0x100000000000008, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x700, 0x0) 19:52:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300, 0x0) 19:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300, 0x0) 19:52:45 executing program 3: bpf$MAP_CREATE(0x100000000000009, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 4: bpf$MAP_CREATE(0x100000000000009, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800, 0x0) 19:52:45 executing program 3: bpf$MAP_CREATE(0x10000000000000a, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:45 executing program 4: bpf$MAP_CREATE(0x10000000000000a, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800, 0x0) 19:52:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x700, 0x0) 19:52:45 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2000, 0x0) 19:52:46 executing program 4: bpf$MAP_CREATE(0x10000000000000b, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf000, 0x0) 19:52:46 executing program 3: bpf$MAP_CREATE(0x10000000000000b, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800, 0x0) 19:52:46 executing program 3: bpf$MAP_CREATE(0x10000000000000c, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:46 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 4: bpf$MAP_CREATE(0x10000000000000c, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf000, 0x0) 19:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffff, 0x0) 19:52:46 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf000, 0x0) 19:52:46 executing program 4: bpf$MAP_CREATE(0x10000000000000d, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffff, 0x0) 19:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000, 0x0) 19:52:46 executing program 3: bpf$MAP_CREATE(0x10000000000000d, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:46 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 4: bpf$MAP_CREATE(0x10000000000000e, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffff, 0x0) 19:52:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000, 0x0) 19:52:46 executing program 3: bpf$MAP_CREATE(0x10000000000000e, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2000000, 0x0) 19:52:46 executing program 4: bpf$MAP_CREATE(0x10000000000000f, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 3: bpf$MAP_CREATE(0x10000000000000f, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:46 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000, 0x0) 19:52:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2000000, 0x0) 19:52:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3000000, 0x0) 19:52:46 executing program 4: bpf$MAP_CREATE(0x100000000000010, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:46 executing program 3: bpf$MAP_CREATE(0x100000000000010, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:47 executing program 4: bpf$MAP_CREATE(0x100000000000011, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4000000, 0x0) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2000000, 0x0) 19:52:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3000000, 0x0) 19:52:47 executing program 3: bpf$MAP_CREATE(0x100000000000011, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 4: bpf$MAP_CREATE(0x100000000000012, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x3000000, 0x0) 19:52:47 executing program 3: bpf$MAP_CREATE(0x100000000000012, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18000000, 0x0) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4000000, 0x0) 19:52:47 executing program 4: bpf$MAP_CREATE(0x100000000000013, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x4000000, 0x0) 19:52:47 executing program 3: bpf$MAP_CREATE(0x100000000000013, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff, 0x0) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x7000000, 0x0) 19:52:47 executing program 4: bpf$MAP_CREATE(0x100000000000014, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:47 executing program 3: bpf$MAP_CREATE(0x100000000000014, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x7000000, 0x0) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff, 0x0) 19:52:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18000000, 0x0) 19:52:47 executing program 4: bpf$MAP_CREATE(0x100000000000015, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:47 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:47 executing program 3: bpf$MAP_CREATE(0x100000000000015, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffff000, 0x0) 19:52:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x18000000, 0x0) 19:52:48 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:48 executing program 4: bpf$MAP_CREATE(0x100000000000016, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x20000000, 0x0) 19:52:48 executing program 3: bpf$MAP_CREATE(0x100000000000016, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 4: bpf$MAP_CREATE(0x100000000000017, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 3: bpf$MAP_CREATE(0x100000000000017, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffff6, 0x0) 19:52:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff, 0x0) 19:52:48 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff, 0x0) 19:52:48 executing program 4: bpf$MAP_CREATE(0x100000000000018, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 3: bpf$MAP_CREATE(0x100000000000018, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffe, 0x0) 19:52:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff, 0x0) 19:52:48 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:48 executing program 4: bpf$MAP_CREATE(0x100000000000019, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff, 0x0) 19:52:48 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) clone(0x1000480, &(0x7f00000002c0)="ba03dbb0ad83b21b17a5b591389b01c902df2650c7043184c41a81edf55140db9ca4f78ba5690ecfada693cf0954beb3709f3dbccc67b77c0706e3427e261c", &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)="665c90e88a39a265ed96b5ce8bef2826ef0c6c91ab6f068e5e3e184f272e616445af0d41") r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:48 executing program 3: bpf$MAP_CREATE(0x100000000000019, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000000000, 0x0) 19:52:48 executing program 4: bpf$MAP_CREATE(0x10000000000001a, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffff000, 0x0) 19:52:48 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffff000, 0x0) 19:52:48 executing program 3: bpf$MAP_CREATE(0x10000000000001a, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:48 executing program 4: bpf$MAP_CREATE(0x10000000000001b, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:48 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffffffffffff, 0x0) 19:52:49 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffff6, 0x0) 19:52:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffff6, 0x0) 19:52:49 executing program 3: bpf$MAP_CREATE(0x10000000000001b, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x100000000000000, 0x0) 19:52:49 executing program 4: bpf$MAP_CREATE(0x10000000000001c, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffe, 0x0) 19:52:49 executing program 3: bpf$MAP_CREATE(0x10000000000001c, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffe, 0x0) 19:52:49 executing program 4: bpf$MAP_CREATE(0x10000000000001d, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x200000000000000, 0x0) 19:52:49 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000000000, 0x0) 19:52:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1000000000000, 0x0) 19:52:49 executing program 3: bpf$MAP_CREATE(0x10000000000001d, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 4: bpf$MAP_CREATE(0x10000000000001e, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:49 executing program 3: bpf$MAP_CREATE(0x10000000000001e, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300000000000000, 0x0) 19:52:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffffffffffff, 0x0) 19:52:49 executing program 4: bpf$MAP_CREATE(0x100000000000021, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:49 executing program 3: bpf$MAP_CREATE(0x100000000000021, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf0ffffffffffff, 0x0) 19:52:49 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:49 executing program 3: bpf$MAP_CREATE(0x100000000000022, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 4: bpf$MAP_CREATE(0x100000000000022, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:49 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x400000000000000, 0x0) 19:52:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x100000000000000, 0x0) 19:52:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x100000000000000, 0x0) 19:52:49 executing program 3: bpf$MAP_CREATE(0x100000000000023, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:49 executing program 4: bpf$MAP_CREATE(0x100000000000023, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800000000000000, 0x0) 19:52:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x200000000000000, 0x0) 19:52:50 executing program 3: bpf$MAP_CREATE(0x100000000000300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x200000000000000, 0x0) 19:52:50 executing program 4: bpf$MAP_CREATE(0x100000000000300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300000000000000, 0x0) 19:52:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff00000000, 0x0) 19:52:50 executing program 3: bpf$MAP_CREATE(0x100000000000500, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x300000000000000, 0x0) 19:52:50 executing program 4: bpf$MAP_CREATE(0x100000000000500, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x400000000000000, 0x0) 19:52:50 executing program 3: bpf$MAP_CREATE(0x100000000000600, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:50 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff00000000, 0x0) 19:52:50 executing program 4: bpf$MAP_CREATE(0x100000000000600, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x400000000000000, 0x0) 19:52:50 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffffffff000, 0x0) 19:52:50 executing program 3: bpf$MAP_CREATE(0x100000000000700, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:50 executing program 4: bpf$MAP_CREATE(0x100000000000700, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x700000000000000, 0x0) 19:52:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x700000000000000, 0x0) 19:52:50 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 3: bpf$MAP_CREATE(0x100000000000900, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:50 executing program 4: bpf$MAP_CREATE(0x100000000000900, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:50 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2) 19:52:50 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800000000000000, 0x0) 19:52:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x1800000000000000, 0x0) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000a00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000a00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3) 19:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x2000000000000000, 0x0) 19:52:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff00000000, 0x0) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000b00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x0, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000b00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xf6ffffff00000000, 0x0) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000c00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff00000000, 0x0) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000c00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfeffffff00000000, 0x0) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000d00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000d00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18) 19:52:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffffffff000, 0x0) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000e00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000e00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0xfffffffffffff000, 0x0) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0) 19:52:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2) 19:52:51 executing program 3: bpf$MAP_CREATE(0x100000000000f00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:51 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:51 executing program 4: bpf$MAP_CREATE(0x100000000000f00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2) 19:52:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300) 19:52:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3) 19:52:52 executing program 3: bpf$MAP_CREATE(0x100000000001100, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001100, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001200, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3) 19:52:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:52 executing program 3: bpf$MAP_CREATE(0x100000000001200, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf000) 19:52:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x7) 19:52:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 3: bpf$MAP_CREATE(0x100000000001300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001400, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffff) 19:52:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) r0 = perf_event_open(&(0x7f00000018c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffeaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 3: bpf$MAP_CREATE(0x100000000001400, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001500, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x7) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000) 19:52:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0) 19:52:52 executing program 3: bpf$MAP_CREATE(0x100000000001500, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:52 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000061c0)={0x0, 0x80, 0x1, 0x0, 0x6, 0x2, 0x0, 0x0, 0x40800, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x52b4, 0x800, 0x0, 0x0, 0x3, 0x6, 0x6, 0x4, @perf_config_ext={0xb105, 0x51c}, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:52 executing program 4: bpf$MAP_CREATE(0x100000000001600, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x6, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001600, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2000000) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001700, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001700, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0) 19:52:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3000000) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001800, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x700) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001800, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001900, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4000000) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001900, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800) 19:52:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x700) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001a00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r1, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18000000) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001b00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001a00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf000) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001c00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800) 19:52:53 executing program 3: bpf$MAP_CREATE(0x100000000001b00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:53 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff) 19:52:53 executing program 4: bpf$MAP_CREATE(0x100000000001d00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:53 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2000) 19:52:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffff) 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000001c00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x19, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff) 19:52:54 executing program 4: bpf$MAP_CREATE(0x100000000001e00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf000) 19:52:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000) 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000001d00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffff000) 19:52:54 executing program 4: bpf$MAP_CREATE(0x100000000001f00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffff) 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000001e00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2000000) 19:52:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffff6) 19:52:54 executing program 4: bpf$MAP_CREATE(0x100000000002000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) [ 193.493471][ T1353] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.500040][ T1353] ieee802154 phy1 wpan1: encryption failed: -22 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000001f00, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3000000) 19:52:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000) 19:52:54 executing program 4: bpf$MAP_CREATE(0x100000000002100, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffe) 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000002000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:54 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4000000) 19:52:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2000000) 19:52:54 executing program 4: bpf$MAP_CREATE(0x100000000002200, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:54 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000000000) 19:52:54 executing program 3: bpf$MAP_CREATE(0x100000000002100, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000000002300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x7000000) 19:52:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x3000000) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000000002200, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffffffffffff) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000001000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18000000) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000000002300, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x4000000) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000002000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x100000000000000) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000001000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000003000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x200000000000000) 19:52:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x7000000) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000002000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000004000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff) 19:52:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300000000000000) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18000000) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000003000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:55 executing program 4: bpf$MAP_CREATE(0x100000005000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:55 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x400000000000000) 19:52:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffff000) 19:52:55 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, 0x0, 0x0}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x20000000) 19:52:55 executing program 3: bpf$MAP_CREATE(0x100000004000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 4: bpf$MAP_CREATE(0x100000006000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 3: bpf$MAP_CREATE(0x100000005000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffff6) 19:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800000000000000) 19:52:56 executing program 3: bpf$MAP_CREATE(0x100000006000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001600)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 4: bpf$MAP_CREATE(0x100000007000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff00000000) 19:52:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001600)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffe) 19:52:56 executing program 3: bpf$MAP_CREATE(0x100000007000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 4: bpf$MAP_CREATE(0x100000008000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff00000000) 19:52:56 executing program 3: bpf$MAP_CREATE(0x100000008000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001600)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 4: bpf$MAP_CREATE(0x100000009000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffff000) 19:52:56 executing program 3: bpf$MAP_CREATE(0x100000009000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000000000) 19:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffffffff000) 19:52:56 executing program 4: bpf$MAP_CREATE(0x10000000a000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffff6) 19:52:56 executing program 3: bpf$MAP_CREATE(0x10000000a000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:56 executing program 4: bpf$MAP_CREATE(0x10000000b000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffffffffffff) 19:52:56 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r1, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0xf7, 0x8000, {}, {0xee00}, 0x4, 0x3}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000100)={0x21, 0x287e, {}, {0xee00}, 0x7, 0x9}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000019c0)=0x0) getresgid(&(0x7f0000001a00), &(0x7f0000001a40)=0x0, &(0x7f0000001a80)) fstat(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000001bc0)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}, {0x2, 0x1, r4}, {0x2, 0x5, r5}, {0x2, 0x1, r6}], {0x4, 0x2}, [{0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x4}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x3, r9}], {0x10, 0x1}, {0x20, 0x6}}, 0x74, 0x2) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:56 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:56 executing program 3: bpf$MAP_CREATE(0x10000000b000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:57 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f549f0033000000000000000c0055000000000000005b3471284f384a50816d14c81c81915707113a4f1a743215def8ea692bb74c2eaa6387988e23d4876c15c7bc5b0180000000000000ac9e947f340b948daa18000800005edd151df76101687ee5ea9fb806b6d913568f35f91c377618fb0c126c12bc97"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:57 executing program 4: bpf$MAP_CREATE(0x10000000c000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffe) 19:52:57 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x100000000000000) 19:52:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r3}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400)={r3, 0x7, 0x0, 0x5}, 0x10) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000380)={{'\x00', 0x2}, {}, 0x8, 0x0, 0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)="1d81c3d9f5cd8963eb1d66111f741d1c6ce05d7e1b6bc13bd4c36d98b513d1b3ba", 0x21, 0x0, &(0x7f00000001c0)={0x2, 0x136, {0x1, 0xc, 0x8f, "32732efd749bb01264c3b81610e37e856eff3597a77a3de112ce890658442f1da12914d817ab04c73e42eade5e8e03233ef9aa05093afc79d3cd37b78f5c81a8844e469148ee59832adb963773937e5d3fda4ee941ac062e7c79b79a48ecf934cd95636d3154dcc1a0d6315d320c0e168e1f3ca595c276e76cb5a80850bd7b0172878f07df1c034fd742421936d46d", 0x9a, "2509c9a29ce2cc5c5c6802d74fd793d3c6926389cb56b07d0abf4e34be17b72bfdd1bc5d7d8d7497cdcf6aa24317d971c2a29f42b2eaf8d6f00ac260a43c6a93f41d908a3420bf403a232c84ce5171f873447b8c1cf79bfc2958df0d4d3e8c5bde0800493e5229c3f89d5723073ea6a2c74b68adbae28952384a330c53d11b34196f18f22096b271456ce313e9c5542d93cb96967c6616ac4128"}, 0x4c, "d4e295364ee3c8488700892dcb08fb59d4ce1cf5e3330fec535e2feb7e1bdf2ee26f273851a8bdb37a134eb869b8b40d017096d05415614994efef2a01e597e238733d7851e28a04f298dc59"}, 0x18e}) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:52:57 executing program 3: bpf$MAP_CREATE(0x10000000c000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:57 executing program 4: bpf$MAP_CREATE(0x10000000d000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:57 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1000000000000) 19:52:57 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:57 executing program 4: bpf$MAP_CREATE(0x10000000e000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x200000000000000) 19:52:57 executing program 3: bpf$MAP_CREATE(0x10000000d000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf0ffffffffffff) 19:52:57 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:57 executing program 4: bpf$MAP_CREATE(0x10000000f000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) truncate(&(0x7f0000000080)='./file0/file0\x00', 0x1) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x10) 19:52:58 executing program 3: bpf$MAP_CREATE(0x10000000e000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300000000000000) 19:52:58 executing program 4: bpf$MAP_CREATE(0x100000010000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x100000000000000) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 4: bpf$MAP_CREATE(0x100000011000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x400000000000000) 19:52:58 executing program 3: bpf$MAP_CREATE(0x10000000f000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x200000000000000) 19:52:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x200000, &(0x7f00000000c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x67]}}], [{@dont_appraise}]}) r0 = open(&(0x7f0000000140)='./file0\x00', 0x400000, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r2, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) chown(&(0x7f0000000000)='./file0\x00', r2, 0xee01) 19:52:58 executing program 4: bpf$MAP_CREATE(0x100000012000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 3: bpf$MAP_CREATE(0x100000010000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x700000000000000) 19:52:58 executing program 4: bpf$MAP_CREATE(0x100000013000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0/file0\x00'}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r3 = accept4(r1, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000380)=@assoc_value={0x0}, &(0x7f0000000100)=0xffffffffffffffc9) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r4, 0xaf, "94bb1e02e94c3c38478b16325ab092392c57b6e5a34766a9d2052b7849b496dd0d56118cbc591243e4ada1bb8624a6176d71e03bb72eee379a66798de32db27e69ba8377f7ab9897925c79a55b0a678bcda9b966ef9d41149002f053f218f8230f5df76e82a673ae8cfd8bdd77a4b2a6c88f69b6e24646f4afcbb767b9ebc132a5950ef4ce5a1e2a77f8a424cc7a40ac16ef8d16439e6b0ae2d58e5d314dfa1da6141a816e567aa8bce464be3b0de0"}, &(0x7f0000000140)=0xb7) chdir(&(0x7f0000000040)='./file0/file0\x00') 19:52:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x300000000000000) 19:52:58 executing program 3: bpf$MAP_CREATE(0x100000011000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800000000000000) 19:52:58 executing program 3: bpf$MAP_CREATE(0x100000012000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 4: bpf$MAP_CREATE(0x100000014000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x400000000000000) 19:52:58 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:58 executing program 3: bpf$MAP_CREATE(0x100000013000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff00000000) 19:52:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r4, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r7, 0x0) setresuid(0xee00, r2, r7) fchownat(r0, &(0x7f0000000080)='./file0\x00', r2, 0x0, 0x100) 19:52:59 executing program 4: bpf$MAP_CREATE(0x100000015000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:59 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x700000000000000) 19:52:59 executing program 3: bpf$MAP_CREATE(0x100000014000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff00000000) 19:52:59 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:59 executing program 3: bpf$MAP_CREATE(0x100000015000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:59 executing program 4: bpf$MAP_CREATE(0x100000016000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x1800000000000000) 19:52:59 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[@ANYRESDEC], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffffffff000) 19:52:59 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x102) open(&(0x7f00000000c0)='./file0/file0\x00', 0x400100, 0x103) mount(&(0x7f0000000100)=@md0, &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='afs\x00', 0x21000, &(0x7f0000000200)='configfs\x00') open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0/file0\x00', 0x146) 19:52:59 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:59 executing program 3: bpf$MAP_CREATE(0x100000016000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:52:59 executing program 4: bpf$MAP_CREATE(0x100000017000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:52:59 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:52:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2000000000000000) 19:52:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mkdir(0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) rename(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='./file0/file0\x00') open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:00 executing program 4: bpf$MAP_CREATE(0x100000018000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:00 executing program 3: bpf$MAP_CREATE(0x100000017000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:00 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0/file0/file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) 19:53:00 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:53:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xf6ffffff00000000) 19:53:00 executing program 4: bpf$MAP_CREATE(0x100000019000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:00 executing program 3: bpf$MAP_CREATE(0x100000018000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='devpts\x00', 0x948019, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:00 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x8000, 0xcc) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x110) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='efivarfs\x00', 0x21c090, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x10c) 19:53:00 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:53:00 executing program 4: bpf$MAP_CREATE(0x10000001a000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfeffffff00000000) 19:53:00 executing program 3: bpf$MAP_CREATE(0x100000019000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:00 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 199.386823][ T26] audit: type=1804 audit(1635105180.378:3): pid=12399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir339092495/syzkaller.VA2oZW/137/file0/file0" dev="sda1" ino=14354 res=1 errno=0 19:53:00 executing program 1: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="017200ee", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0xe, 0x2) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1080000, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:00 executing program 5: prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') recvmmsg$unix(r1, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x2, &(0x7f0000000300)}}, {{&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000001880)=""/198, 0xc6}, {&(0x7f00000003c0)=""/8, 0x8}], 0x2, &(0x7f0000000440)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f00000006c0)=""/80, 0x50}, {&(0x7f0000001980)=""/189, 0xbd}, {&(0x7f0000001a40)=""/233, 0xe9}, {&(0x7f0000001b40)=""/178, 0xb2}, {&(0x7f0000001c00)=""/196, 0xc4}, {&(0x7f0000000580)=""/12, 0xc}], 0x6, &(0x7f0000000740)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001d80), 0x6e, &(0x7f0000001f40)=[{&(0x7f0000003100)=""/235, 0xeb}, {&(0x7f0000001f00)=""/51, 0x33}], 0x2, &(0x7f0000001f80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000002040)=@abs, 0x6e, &(0x7f0000002400)=[{&(0x7f00000020c0)=""/9, 0x9}, {&(0x7f0000002100)=""/79, 0x4f}, {&(0x7f0000002180)=""/102, 0x66}, {&(0x7f0000002480)=""/43, 0x2b}, {&(0x7f0000002240)=""/225, 0xe1}, {&(0x7f0000002340)=""/172, 0xac}], 0x6, &(0x7f0000000300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000002880)=@abs, 0x6e, &(0x7f00000026c0)=[{&(0x7f0000002540)=""/247, 0xf7}, {&(0x7f0000002640)=""/114, 0x72}, {0xfffffffffffffffc}], 0x3, &(0x7f0000002700)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xf8}}, {{&(0x7f0000002800)=@abs, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000001e00)=""/222, 0xde}, {&(0x7f0000002980)=""/67, 0x43}, {&(0x7f0000002a00)=""/200, 0xc8}, {&(0x7f0000002b00)=""/63, 0x3f}, {&(0x7f0000002b40)=""/151, 0x97}, {&(0x7f0000002c00)=""/5, 0x5}, {&(0x7f0000002c40)=""/100, 0x64}, {&(0x7f0000003200)=""/244, 0xf4}, {&(0x7f0000002dc0)}], 0x9, &(0x7f0000002ec0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}], 0x7, 0x12101, &(0x7f00000030c0)={0x0, 0x3938700}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x9, 0x8, 0x1a, 0x91, 0x0, 0x3f, 0x1004, 0x12, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000140)}, 0x11, 0xffffffff, 0x9, 0x3, 0x80000001, 0xc0000000, 0x4, 0x0, 0x2}, r2, 0x3, r1, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0x80000000, 0x20, [0xffff, 0xfffffff8, 0x6, 0x1, 0x3, 0x8001, 0x3, 0x1]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x2, 0x10000000, 0x4, 0x4, 0x81, 0x7fff, 0x4, 0x0, 0x7}, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x20400, 0x104) 19:53:00 executing program 4: bpf$MAP_CREATE(0x10000001b000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:00 executing program 3: bpf$MAP_CREATE(0x10000001a000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) [ 199.511772][ T26] audit: type=1804 audit(1635105180.418:4): pid=12399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir339092495/syzkaller.VA2oZW/137/file0/file0" dev="sda1" ino=14354 res=1 errno=0 19:53:00 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:53:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0xfffffffffffff000) 19:53:00 executing program 4: bpf$MAP_CREATE(0x10000001c000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:00 executing program 3: bpf$MAP_CREATE(0x10000001b000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:00 executing program 5: bind(0xffffffffffffffff, &(0x7f0000000080)=@rc={0x1f, @none, 0xff}, 0x80) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0/file0\x00') open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:00 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:53:00 executing program 3: bpf$MAP_CREATE(0x10000001c000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:00 executing program 4: bpf$MAP_CREATE(0x10000001d000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0xe499}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x9f}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'configfs\x00'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfshat={'smackfshat', 0x3d, 'configfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'configfs\x00'}}]}) 19:53:01 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:53:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00') mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:01 executing program 3: bpf$MAP_CREATE(0x10000001d000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:01 executing program 4: bpf$MAP_CREATE(0x10000001e000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [{}, {0x2, 0x6}, {0x2, 0x2}], {0x4, 0x5}, [{0x8, 0x0, r1}, {0x8, 0x1, 0xee00}, {0x8, 0x0, 0xee00}], {0x10, 0xc}}, 0x54, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x80001, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x1000}}, {@blksize}], [{@dont_appraise}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, 'configfs\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}}) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:01 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:53:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x880, 0x1a5) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x800000, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@cache_fscache}, {@posixacl}], [{@smackfstransmute}, {@fowner_lt={'fowner<', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'configfs\x00'}}, {@context={'context', 0x3d, 'staff_u'}}]}}) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:01 executing program 3: bpf$MAP_CREATE(0x10000001e000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:01 executing program 4: bpf$MAP_CREATE(0x10000001f000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:01 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0xffffffff, 0x0, &(0x7f0000000080)=[r0]}, 0x1) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:01 executing program 2: clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x40) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x400}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000001a40)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:53:01 executing program 3: bpf$MAP_CREATE(0x10000001f000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) chdir(&(0x7f00000008c0)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840), 0x4000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r1, 0x0) statx(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x800, 0x4, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000640)='./file0/file0\x00', r1, r2) r3 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) syz_mount_image$minix(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40, 0x4, &(0x7f0000000300)=[{&(0x7f00000000c0)="87f46d688e5f070d99933d36741cec5d674c725d91722b32ff5e0bf9c23debeed371ee04a625894a51b3dd0a6a741e322c0a65", 0x33, 0x8}, {&(0x7f0000000100)="512cbba86792311492a0c10de45e1c517f246b231a0c225297e0acd9a63b4edf0c3482520cbb04127725722e7e4a42f71b80542ef949adfe0d5cdaa080e46668a436e74de7b225db03ae60d106c248c5ebcbac28e2dacbdf046df5b2f8263ae32d1a8bf5ba057e3ccaf9b033c28f5eb3dbfc47391567c6706c55deb46fcbb4b4631644eb628657b2856f78328f236736e1b51b9c09a5a7e75b5cb11324a296445460d35b0b165b1aeb23b0fcc17e951c46724eb1507f481b347b07d727490f7bd468f7cddceea2078d30cbb54150291fb91c899c68f5378280586e1d35cf9428f5d14a3cd985d5828c4268cf73f979e78527", 0xf2, 0x4a}, {&(0x7f0000000200)="2fc881dccc8d158e4fa716e9a0d4b0eef08c42e8155e03ab5fb45e01f443bab8b4743a33a5669db2fd9a166d014ef3f2ca81b49a02cdfe63a40194a1cdc1b7f6e93781d263cd522bac21d0bca0dc746a4aad363fd1c5829dd1e36cdcd1", 0x5d, 0x9}, {&(0x7f0000000280)="6dc786182d20d79960bc3e9eb302b89064c4f7f6f4ae6595881706dd1c7ae80eb1b9ec091ae43e56fb58732077581b29f1865876c553ebcf06a2f650e1a33e6532fcdf20e8f24558fc3e000320d5f7898d0da23456f7086fdca54af0a2c8f46a3db28117b784d13204e5e0af3831c05297", 0x71, 0x100000000}], 0x8000, &(0x7f0000000500)=ANY=[@ANYBLOB='configfs\x00,configfs\x00,rootcontext=system_u,uid=', @ANYRESDEC=r4, @ANYBLOB=',subj_type=configfs\x00,fsc\bntext=u|confined_u,dont_measure,\x00']) r5 = syz_open_dev$vcsa(&(0x7f0000000580), 0x365, 0x210200) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000005c0)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000600)={r6, @rand_addr=0x64010101, @loopback}, 0xc) 19:53:01 executing program 4: bpf$MAP_CREATE(0x100000020000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0/file0\x00', 0x101000, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xde, 0x4, 0xe2, "7290aabb963608a8753ea9715d2597a0", "eb051309cf979d9fc5e1646e38532cd4ffaa395f009b0f05e687787f0c90cf727083194f1c120a6ff8ae4954b99ae6dccbc410506b147a3958c4b7ca831fcbec5b129ed2959b0b96223ee07529e099bcfc83bfa4a8adfae95fc87a22cfe5f0eaaeee3039ff43866427b081206ffad0deb894e0590567a56783d2e0f32d713625d45f10e8fed6899ae83d4092dad930b659fd011e14bf424fccb258f3450becc8bc74a5be64ed5cf67bf5c8e03563243a6c3f92842f58dfcd901f7e21c8ce658968f235ee872c23f53c"}, 0xde, 0x3) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "238deccf5c7b08918c39bd8a3713b87d205f0b3a2bcda8908d381fd522"}, 0x21) 19:53:01 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="757365722e636f6e66698f897f67667300cef859da9148fa9fc11674f9b50891c23379de8498e0b0c0672e34f4b5bb47ed1c8d98dd30a0760ae585adc3e0960a0cddac654241aadcb210b5cbd036b321dd04d0ddfeb6d948e20e38b2d9188ad37a7c0e2ea90b9a3414b87d4f6edb0a6bf06d65017bfc596510d1fc2be4fb8ccf6309b61dae58269509aa004ccbf305d2e2a96037b854adeb1611af95272d83"]) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:01 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r4, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r7, 0x0) setresuid(0xee00, r2, r7) fchownat(r0, &(0x7f0000000080)='./file0\x00', r2, 0x0, 0x100) 19:53:01 executing program 3: bpf$MAP_CREATE(0x100000020000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:01 executing program 4: bpf$MAP_CREATE(0x100000021000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x205) mkdir(&(0x7f0000000080)='./file0/file0/file0\x00', 0x28) mount(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/67, 0x43}, {&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/100, 0x64}], 0x4, &(0x7f0000000340)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x60) sendmsg$nl_route_sched(r1, &(0x7f0000000440)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)=@newchain={0x78c, 0x64, 0x100, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xb, 0x2}, {0xc, 0xe}, {0x2, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x6, 0x57}}, @TCA_RATE={0x6, 0x5, {0x9}}, @filter_kind_options=@f_route={{0xa}, {0x2c, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x85}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0xe, 0xd}}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x5d}]}}, @TCA_CHAIN={0x8, 0xb, 0x7fffffff}, @TCA_CHAIN={0x8, 0xb, 0x800}, @TCA_CHAIN={0x8, 0xb, 0x3f}, @filter_kind_options=@f_fw={{0x7}, {0x700, 0x2, [@TCA_FW_MASK={0x8}, @TCA_FW_MASK={0x8, 0x5, 0x9}, @TCA_FW_INDEV={0x14, 0x3, 'batadv_slave_1\x00'}, @TCA_FW_POLICE={0x498, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x1ff, 0x2, 0x4, 0x3, 0xfff, {0xec, 0x1, 0xfff, 0x2, 0xad7b, 0x3}, {0xf, 0x1, 0x0, 0x4, 0x3, 0x645c}, 0x7, 0xff, 0x1f}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x2, 0x9e7c, 0x4, 0x8000, {0xff, 0x2, 0x2b3c, 0xbc0, 0x7, 0x2}, {0x20, 0x1, 0x6418, 0x8001, 0x1, 0x5}, 0x101, 0x81, 0x2}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x1000}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x80000001, 0x73b7cda7, 0x0, 0x5, 0x8, 0x8, 0x4c2e1e7e, 0xfffff800, 0x306c, 0x8, 0x1000, 0x10001, 0x1, 0x80000000, 0x3, 0x6, 0xe89, 0x3, 0xfffffff9, 0xfffffff8, 0x5, 0x7a200, 0x101, 0x0, 0x1, 0xffffff5e, 0x3f, 0x14, 0x80000000, 0x4, 0xfffff801, 0xfc, 0x0, 0x4, 0x1, 0x5, 0x58, 0x9, 0x7, 0x35, 0x101, 0xfff, 0x6, 0x8, 0x7, 0x2c8, 0x6, 0x3ff, 0x0, 0x2, 0x40, 0x4, 0x3ff, 0x2, 0x3f, 0xd6, 0x0, 0x1, 0xfff, 0x2, 0x9, 0x2, 0x6, 0x1, 0x9f3, 0x7a, 0x4e, 0x0, 0x1fe00, 0x66, 0x3, 0x1f, 0x6, 0xffffffff, 0xa186, 0x2, 0x0, 0x8, 0x3, 0xfffffff9, 0x6, 0x3, 0x81, 0x9, 0x9, 0xa133, 0x3, 0x10001, 0x0, 0x7cc, 0xffff3f5e, 0x5, 0x9, 0x500d, 0x3117, 0x10001, 0x1, 0x9, 0x7fffffff, 0x4, 0x14000, 0x8000, 0x0, 0x0, 0x80000000, 0x0, 0x800, 0x6, 0x6, 0xffffffe1, 0xcb, 0x1, 0x8904, 0x5, 0x56, 0x9, 0x9, 0x0, 0x400, 0x7, 0xffffff01, 0x1ff, 0x8c, 0xe65d82d, 0x1800, 0x7, 0x1000, 0x9, 0x1000, 0x200, 0x1, 0xffffffff, 0xc0000000, 0x80, 0x6, 0x91ba, 0x0, 0xb030, 0x6, 0x80000001, 0x1000, 0x7c8, 0x6, 0x5a23, 0x4, 0x3, 0x800, 0x2, 0x9383, 0x1, 0x0, 0x48, 0x9, 0x2a08, 0x7f, 0x4, 0x10000, 0x8001, 0x1, 0x1, 0xf6d, 0x3, 0x7f, 0xfff, 0xda9, 0x20, 0x80000000, 0x80000001, 0x914c, 0x31cd, 0x2, 0x4, 0xffffff81, 0x200, 0x2, 0x40, 0xfff, 0x6, 0x3, 0x5, 0x9, 0x9, 0x3f, 0x1, 0x600, 0xfffffffd, 0x8, 0x8, 0x0, 0x5, 0x7, 0x2, 0x8000, 0x7f, 0x0, 0x2e21, 0x4, 0x3, 0x40, 0x2, 0x6, 0xfffff32d, 0x8, 0x10001, 0x0, 0x800, 0x101, 0x80, 0xfffffeff, 0x1f, 0x6, 0x3, 0xfffffffe, 0x3f, 0x3, 0x0, 0xb3, 0x81, 0x4, 0x1f, 0x40, 0xbb, 0x401, 0x7, 0xfffffff8, 0x7, 0x4, 0x2, 0x2, 0x34a, 0x9, 0xe, 0x1b, 0x40, 0x8001, 0x3, 0x7, 0x80000000, 0x6, 0x74e, 0x1, 0x4, 0x5, 0x101, 0x81, 0x2, 0x80000001, 0x1, 0x7, 0x8, 0x3, 0xfff, 0x5, 0x3, 0x77ef1b9b]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}]}, @TCA_FW_CLASSID={0x8, 0x1, {0xc, 0xb}}, @TCA_FW_INDEV={0x14, 0x3, 'bond_slave_1\x00'}, @TCA_FW_INDEV={0x14, 0x3, 'wlan1\x00'}, @TCA_FW_POLICE={0xc, 0x2, [@TCA_POLICE_RESULT={0x8, 0x5, 0x50b}]}, @TCA_FW_ACT={0x204, 0x4, [@m_simple={0x80, 0x14, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xd, 0x3, 'configfs\x00'}, @TCA_DEF_DATA={0x7, 0x3, '.(\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x33, 0x6, "48347c11fce882a169b14b31efcdd4f6fd8e632777a7305861cd3f18b38414704cabe90a0c702f6bf7d99861a248a8"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_vlan={0x180, 0x12, 0x0, 0x0, {{0x9}, {0x7c, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0xe7, 0x87b9, 0x0, 0x8001, 0xce}, 0x2}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x34, 0x80, 0xffffffffffffffff, 0x1, 0x80000000}, 0x2}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x4, 0xe722, 0x2, 0x3, 0x4}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x7629f5a8, 0x709, 0xffffffffffffffff, 0x7, 0x6}, 0x2}}]}, {0xd9, 0x6, "3afde6941506a77fe94f93314b39e356b13fb62c89b54d3ccca9beaf5f739be754c2caa2a07c90f9fc45658d620bfb48c6079194c499d35a209fea37bcde838d6252f2dedafa54f636f70bbf4f11553b36038bbe2f14cbb01b286873ba2687af7275d5fb96ebabccd460a9a8c0e70bd7aff8a16891b362e8f7fd7c250e82c64fa68ab7e67584c55bfc9e72e05b3a0c6a5f7efb526d8dd2b28fa0aa66d32b6a5d24915a409e1e62bbbfcc9b72c1ab02273b3dc5668c9ae5bbd7dc5423072381de58a5f149d33a470f78679a11e92ad2ea4712bb66ec"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}]}, 0x78c}, 0x1, 0x0, 0x0, 0x60400c1}, 0x200008c0) 19:53:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='affs\x00', 0x1214889, &(0x7f0000000140)='configfs\x00') mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r4, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r7, 0x0) setresuid(0xee00, r2, r7) fchownat(r0, &(0x7f0000000080)='./file0\x00', r2, 0x0, 0x100) 19:53:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='befs\x00', 0x20004aa, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000080)='#+]\x00', &(0x7f00000000c0)='befs\x00', &(0x7f0000000100)='befs\x00'], &(0x7f0000000340)=[&(0x7f0000000180)='befs\x00', &(0x7f00000001c0)='befs\x00', &(0x7f0000000200)='befs\x00', &(0x7f0000000240)='befs\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='befs\x00', &(0x7f0000000300)='&[+,\x00']) sendfile(r0, r0, &(0x7f0000000380)=0xfffffffffffffff7, 0x3) 19:53:02 executing program 4: bpf$MAP_CREATE(0x100000022000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:02 executing program 3: bpf$MAP_CREATE(0x100000021000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:02 executing program 4: bpf$MAP_CREATE(0x100000023000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0/file0\x00') [ 201.170716][T12524] affs: Unrecognized mount option "configfs" or missing value [ 201.218503][T12524] affs: Error parsing options 19:53:02 executing program 3: bpf$MAP_CREATE(0x100000022000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r4, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r5, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r7, 0x0) setresuid(0xee00, r2, r7) fchownat(r0, &(0x7f0000000080)='./file0\x00', r2, 0x0, 0x100) 19:53:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)="e0b3b0cec3d0b90617b7c91fa24874fd21168c835f07271a07713a039891df6268a63e34b0a0fbd5ff883359baf7c9f3be5f6c0db86d27308c14f9e00c2ff4d7366b5be924966202afef553097456d2d2e155073b128545ded56a50035aa15e6924effa8083365c9293be942be3ed33f597d3a7245ff049ad7482cac90f4c1e64fb0731feffb584a26455aa84d71c5a8b74c2cae03f5de86efbe4e02259e636b26d74bfa2b7afcca9c4453657a52ad6e3b48116857fdb4a98ed68355b6329c7dd7362793eb484e", 0xc7}], 0x1, 0x0, 0x2f0}, 0x0) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES16=r1], 0x6db6e559) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a317a7925e61d"], 0x9) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)='./file0/file0\x00', 0xe, 0x1) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x60080, 0x0) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000080)={0x4f, 0xd41, 0x7, 0x116, 0xfff, 0x1}) 19:53:02 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [{}, {0x2, 0x6}, {0x2, 0x2}], {0x4, 0x5}, [{0x8, 0x0, r1}, {0x8, 0x1, 0xee00}, {0x8, 0x0, 0xee00}], {0x10, 0xc}}, 0x54, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000001c0)={{}, {0x1, 0x1}, [{0x2, 0x0, 0xee00}], {0x4, 0x3}, [{0x8, 0x5, r1}], {0x10, 0x2}, {0x20, 0x1}}, 0x34, 0x6) 19:53:02 executing program 4: bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2f) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x180) 19:53:02 executing program 3: bpf$MAP_CREATE(0x100000023000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:02 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x1d, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r3, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r4, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r6, 0x0) setresuid(0xee00, r1, r6) 19:53:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x1000000, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0/file0/file1\x00', 0x60300, 0x0) mkdir(&(0x7f0000000080)='./file0/file0/file1\x00', 0x109) 19:53:02 executing program 3: bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) r0 = memfd_secret(0x80000) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r2 = getegid() read$FUSE(0xffffffffffffffff, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_gt}, {@euid_eq={'euid', 0x3d, r3}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x25c9b146cec4ca0c, 0x32, 0x65, 0x64, 0x37, 0x36, 0x37], 0x2d, [0x38, 0x65, 0x62, 0x38], 0x2d, [0x8ee8bc8d7fe44b15, 0x35, 0x39, 0x65], 0x2d, [0x65, 0x33, 0x37, 0x32], 0x2d, [0x33, 0x65, 0x39, 0x31, 0x61, 0x31, 0x32, 0x36]}}}, {@context={'context', 0x3d, 'root'}}, {@uid_lt}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}]}}) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280), 0x10000, &(0x7f00000002c0)={[{@index_on}], [{@appraise_type}, {@audit}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, ':[%&-:'}}, {@context={'context', 0x3d, 'user_u'}}]}) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:02 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r5, 0x0) 19:53:02 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x1d, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x30401b, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on}, {@default_permissions}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fowner_gt}, {@uid_lt}]}) open(&(0x7f0000000140)='./file1\x00', 0x20000, 0x173) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) 19:53:02 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x2, 0x4, 0xffbf, 0x0, 0x1}, 0x40) [ 201.850922][T12577] ------------[ cut here ]------------ [ 201.864346][T12577] refcount_t: addition on 0; use-after-free. [ 201.873669][T12577] WARNING: CPU: 1 PID: 12577 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 [ 201.900023][T12577] Modules linked in: [ 201.914560][T12577] CPU: 1 PID: 12577 Comm: syz-executor.1 Not tainted 5.15.0-rc6-syzkaller #0 [ 201.954262][T12577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:53:03 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 19:53:03 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x100) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020}, 0x2020) mount$overlay(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@index_off}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on}, {@xino_auto}, {@default_permissions}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r2, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/252, 0xfc}, {&(0x7f0000000780)=""/213, 0xd5}], 0x2, 0x1, 0x7) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x2, 0x2}}, 0x28) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 19:53:03 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x3, 0x4, 0xffbf, 0x0, 0x1}, 0x40) [ 202.003551][T12577] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 19:53:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='configfs\x00', &(0x7f0000000100)='configfs\x00', &(0x7f0000000140)='configfs\x00', &(0x7f0000000180)='configfs\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)], &(0x7f0000000500)=[&(0x7f0000000280)='*$l:!\x00', &(0x7f00000002c0)='configfs\x00', &(0x7f0000000300)='configfs\x00', &(0x7f0000000340)='configfs\x00', &(0x7f0000000380)='\'+()\x02\x00', &(0x7f00000003c0)='configfs\x00', &(0x7f0000000400)='configfs\x00', &(0x7f0000000440)='\x00', &(0x7f00000004c0)='\\%!\x00']) open(&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x0) [ 202.044808][T12577] Code: 09 31 ff 89 de e8 17 5e 9c fd 84 db 0f 85 36 ff ff ff e8 ca 57 9c fd 48 c7 c7 40 ee e3 89 c6 05 52 67 7f 09 01 e8 52 1c 19 05 <0f> 0b e9 17 ff ff ff e8 ab 57 9c fd 0f b6 1d 37 67 7f 09 31 ff 89 19:53:03 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf, 0x0, 0x1}, 0x40) 19:53:03 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x2, 0x4, 0x0, 0x0, 0x1}, 0x40) [ 202.113343][T12577] RSP: 0018:ffffc9000c947f10 EFLAGS: 00010286 [ 202.142228][T12577] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 202.192863][T12577] RDX: 0000000000040000 RSI: ffffffff815e9d98 RDI: fffff52001928fd4 [ 202.236432][T12577] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 202.282325][T12577] R10: ffffffff815e3b3e R11: 0000000000000000 R12: 0000000000000000 [ 202.304564][T12577] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 202.315005][T12577] FS: 00007fa9c1964700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 202.336415][T12577] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 202.343511][T12577] CR2: 00007f64c2caa1b8 CR3: 000000008774c000 CR4: 0000000000350ee0 [ 202.352176][T12577] Call Trace: [ 202.355642][T12577] __x64_sys_memfd_secret+0x182/0x1e0 [ 202.361973][T12577] do_syscall_64+0x35/0xb0 [ 202.367381][T12577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.373348][T12577] RIP: 0033:0x7fa9c43eea39 [ 202.378724][T12577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.400665][T12577] RSP: 002b:00007fa9c1964188 EFLAGS: 00000246 ORIG_RAX: 00000000000001bf [ 202.411320][T12577] RAX: ffffffffffffffda RBX: 00007fa9c44f1f60 RCX: 00007fa9c43eea39 [ 202.420759][T12577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000080000 [ 202.435902][T12577] RBP: 00007fa9c4448e8f R08: 0000000000000000 R09: 0000000000000000 [ 202.454646][T12577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.474883][T12577] R13: 00007ffd1d82addf R14: 00007fa9c1964300 R15: 0000000000022000 [ 202.495145][T12577] Kernel panic - not syncing: panic_on_warn set ... [ 202.501747][T12577] CPU: 1 PID: 12577 Comm: syz-executor.1 Not tainted 5.15.0-rc6-syzkaller #0 [ 202.510775][T12577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.521005][T12577] Call Trace: [ 202.524287][T12577] dump_stack_lvl+0xcd/0x134 [ 202.528889][T12577] panic+0x2b0/0x6dd [ 202.532800][T12577] ? __warn_printk+0xf3/0xf3 [ 202.537397][T12577] ? __warn.cold+0x1a/0x44 [ 202.541812][T12577] ? refcount_warn_saturate+0x169/0x1e0 [ 202.547359][T12577] __warn.cold+0x35/0x44 [ 202.551606][T12577] ? wake_up_klogd.part.0+0x8e/0xd0 [ 202.556805][T12577] ? refcount_warn_saturate+0x169/0x1e0 [ 202.562351][T12577] report_bug+0x1bd/0x210 [ 202.566689][T12577] handle_bug+0x3c/0x60 [ 202.570848][T12577] exc_invalid_op+0x14/0x40 [ 202.575346][T12577] asm_exc_invalid_op+0x12/0x20 [ 202.580196][T12577] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 [ 202.586688][T12577] Code: 09 31 ff 89 de e8 17 5e 9c fd 84 db 0f 85 36 ff ff ff e8 ca 57 9c fd 48 c7 c7 40 ee e3 89 c6 05 52 67 7f 09 01 e8 52 1c 19 05 <0f> 0b e9 17 ff ff ff e8 ab 57 9c fd 0f b6 1d 37 67 7f 09 31 ff 89 [ 202.606557][T12577] RSP: 0018:ffffc9000c947f10 EFLAGS: 00010286 [ 202.612623][T12577] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 202.620590][T12577] RDX: 0000000000040000 RSI: ffffffff815e9d98 RDI: fffff52001928fd4 [ 202.628563][T12577] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 202.636529][T12577] R10: ffffffff815e3b3e R11: 0000000000000000 R12: 0000000000000000 [ 202.644499][T12577] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 202.652474][T12577] ? wake_up_klogd.part.0+0x8e/0xd0 [ 202.657679][T12577] ? vprintk+0x88/0x90 [ 202.661749][T12577] __x64_sys_memfd_secret+0x182/0x1e0 [ 202.663328][T12576] ------------[ cut here ]------------ [ 202.667119][T12577] do_syscall_64+0x35/0xb0 [ 202.667143][T12577] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.682470][T12576] refcount_t: decrement hit 0; leaking memory. [ 202.682934][T12577] RIP: 0033:0x7fa9c43eea39 [ 202.693458][T12577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.703720][T12576] WARNING: CPU: 0 PID: 12576 at lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0 [ 202.713177][T12577] RSP: 002b:00007fa9c1964188 EFLAGS: 00000246 ORIG_RAX: 00000000000001bf [ 202.713202][T12577] RAX: ffffffffffffffda RBX: 00007fa9c44f1f60 RCX: 00007fa9c43eea39 [ 202.713215][T12577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000080000 [ 202.713228][T12577] RBP: 00007fa9c4448e8f R08: 0000000000000000 R09: 0000000000000000 [ 202.713240][T12577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.762896][T12577] R13: 00007ffd1d82addf R14: 00007fa9c1964300 R15: 0000000000022000 [ 202.763463][T12576] Modules linked in: [ 202.771486][T12577] Kernel Offset: disabled [ 202.781033][T12577] Rebooting in 86400 seconds..