, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 08:58:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x200}], 0x5, 0x1) [ 436.117168][T22105] new mount options do not match the existing superblock, will be ignored [ 436.138390][T22110] new mount options do not match the existing superblock, will be ignored [ 436.214772][T22119] new mount options do not match the existing superblock, will be ignored [ 436.223767][T22120] new mount options do not match the existing superblock, will be ignored 08:58:39 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:39 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:39 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}]}}) 08:58:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x200}], 0x5, 0x1) 08:58:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 08:58:39 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b4, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a2, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xa, 0x24, 0x7, 0x1, 0x56e1, [0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) [ 438.626781][T22091] syz-executor.0 (22091) used greatest stack depth: 9264 bytes left 08:58:39 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x200}], 0x5, 0x1) 08:58:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) [ 438.672275][T22127] new mount options do not match the existing superblock, will be ignored [ 438.696177][T22129] new mount options do not match the existing superblock, will be ignored 08:58:39 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:39 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}]}}) 08:58:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {0xffffffffffffffff, 0x10}, {r1}], 0x5, 0x1) [ 438.774064][T22140] new mount options do not match the existing superblock, will be ignored [ 438.797861][T22142] new mount options do not match the existing superblock, will be ignored [ 438.854166][T22150] new mount options do not match the existing superblock, will be ignored 08:58:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) 08:58:42 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:42 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {r1}], 0x4, 0x1) 08:58:42 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x387}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x10) poll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x18}, {r1, 0x200}], 0x2, 0x1) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) write$nbd(0xffffffffffffffff, 0x0, 0x68) 08:58:42 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b4, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a2, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xa, 0x24, 0x7, 0x1, 0x56e1, [0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, 0x0, 0x0) 08:58:42 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {}], 0x4, 0x1) 08:58:42 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 441.725059][T22159] new mount options do not match the existing superblock, will be ignored [ 441.738101][T22160] new mount options do not match the existing superblock, will be ignored [ 441.752225][T22158] new mount options do not match the existing superblock, will be ignored 08:58:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {}], 0x4, 0x1) 08:58:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3890", 0x3}, {0x0, 0x0, 0xc1871}], 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 08:58:42 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 441.806467][T22167] new mount options do not match the existing superblock, will be ignored [ 441.821798][T22160] new mount options do not match the existing superblock, will be ignored [ 441.835119][T22170] new mount options do not match the existing superblock, will be ignored [ 441.896870][T22177] new mount options do not match the existing superblock, will be ignored 08:58:45 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 08:58:45 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}, {}], 0x4, 0x1) 08:58:45 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:45 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b4, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a2, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xa, 0x24, 0x7, 0x1, 0x56e1, [0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:45 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:45 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:45 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 444.766913][T22185] new mount options do not match the existing superblock, will be ignored [ 444.790493][T22189] new mount options do not match the existing superblock, will be ignored 08:58:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {r1}], 0x3, 0x1) 08:58:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0), 0x0) 08:58:45 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:45 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 444.890518][T22200] new mount options do not match the existing superblock, will be ignored [ 444.901416][T22201] new mount options do not match the existing superblock, will be ignored 08:58:48 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 08:58:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0), 0x0) 08:58:48 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_gettime(0x0, &(0x7f0000000540)) 08:58:48 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}], 0x3, 0x1) 08:58:48 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:48 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x0, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:48 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_gettime(0x0, &(0x7f0000000540)) 08:58:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0), 0x0) 08:58:48 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 447.816402][T22212] new mount options do not match the existing superblock, will be ignored [ 447.847305][T22215] new mount options do not match the existing superblock, will be ignored 08:58:48 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_gettime(0x0, &(0x7f0000000540)) 08:58:48 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}], 0x3, 0x1) 08:58:48 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 447.918599][T22223] new mount options do not match the existing superblock, will be ignored [ 447.960011][T22228] new mount options do not match the existing superblock, will be ignored 08:58:49 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 08:58:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{0x0}], 0x1) 08:58:49 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:49 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) 08:58:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}, {}], 0x3, 0x1) 08:58:49 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x0, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:49 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{0x0}], 0x1) 08:58:49 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 448.707994][T22236] new mount options do not match the existing superblock, will be ignored [ 448.729017][T22238] new mount options do not match the existing superblock, will be ignored 08:58:49 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {r1}], 0x2, 0x1) 08:58:49 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 448.807105][T22246] new mount options do not match the existing superblock, will be ignored [ 448.842632][T22251] new mount options do not match the existing superblock, will be ignored 08:58:50 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 08:58:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{0x0}], 0x1) 08:58:50 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}], 0x2, 0x1) 08:58:50 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:58:50 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x0, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:50 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:50 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:58:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)}], 0x1) [ 449.595634][T22260] new mount options do not match the existing superblock, will be ignored [ 449.619469][T22262] new mount options do not match the existing superblock, will be ignored 08:58:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}], 0x2, 0x1) 08:58:50 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:50 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000240)=0x84, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 449.702417][T22271] new mount options do not match the existing superblock, will be ignored [ 449.740260][T22275] new mount options do not match the existing superblock, will be ignored 08:58:50 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:50 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)}], 0x1) 08:58:50 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket$inet6(0xa, 0x5, 0x8a) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x20, &(0x7f0000000580)=0x81, 0x8) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000300)={r1, 0x2, 0xfff, "d6305b010e18cfa86fa9d5045a5dfa5d38f210c7867e24126e4bd0890177368446ec38503b0b8097ed286265fec0caacdd7b16643cdbfe1a1414f178af82431c9a9041b043676b35004da6577a9e9c97a48ef3a2efa7ba4b07130b3adb99f313f115a0e5d2367ec103e7089d3cc05e6a101439e927002032ff5f7b9ee029f0722b7a67795d5e412568ac8fa48ad3fd0100a51b4f0e723af5ac2952257d2762"}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x3, 0x10, @loopback}, 0x1c) sendmmsg(r3, &(0x7f0000002cc0), 0x1a3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x7, 0x1, 0x36, 0x7e, @broadcast}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000000)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)={0x0}}, 0x20000801) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@jqfmt_vfsold='jqfmt=vfsold'}]}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'os2.', 'reiserfs\x00'}, &(0x7f0000000200)=""/191, 0xbf) 08:58:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}, {}], 0x2, 0x1) 08:58:50 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x177, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x165, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:51 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)}], 0x1) [ 450.481951][T22284] new mount options do not match the existing superblock, will be ignored [ 450.511874][T22288] new mount options do not match the existing superblock, will be ignored 08:58:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:51 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:51 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x1) 08:58:51 executing program 3: ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000300ad"]) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 08:58:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x387}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42202, 0x0) open$dir(0x0, 0x7e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200000000003f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x6, 0x0, 0x3, 0x0, 0x1ff, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x2) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 450.606512][T22301] new mount options do not match the existing superblock, will be ignored 08:58:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 450.674823][T22306] new mount options do not match the existing superblock, will be ignored 08:58:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000840)='ntfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x208c04, &(0x7f0000000100)) [ 450.722086][T22310] new mount options do not match the existing superblock, will be ignored [ 450.785997][T22310] new mount options do not match the existing superblock, will be ignored 08:58:51 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x177, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x165, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:51 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x1) 08:58:51 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x387}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42202, 0x0) open$dir(0x0, 0x7e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200000000003f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x6, 0x0, 0x3, 0x0, 0x1ff, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x2) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 08:58:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:51 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x387}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42202, 0x0) open$dir(0x0, 0x7e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200000000003f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x6, 0x0, 0x3, 0x0, 0x1ff, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x2) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 08:58:51 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 451.042796][T22326] new mount options do not match the existing superblock, will be ignored [ 451.060611][T22328] new mount options do not match the existing superblock, will be ignored [ 451.073595][T22329] new mount options do not match the existing superblock, will be ignored 08:58:51 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}], 0x1, 0x1) 08:58:51 executing program 4: syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r2, 0x8200) 08:58:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:51 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x387}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x42202, 0x0) open$dir(0x0, 0x7e, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x5, 0x0, 0x1, 0x0, 0x200000000003f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x6, 0x0, 0x3, 0x0, 0x1ff, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x2) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 451.189271][T22338] new mount options do not match the existing superblock, will be ignored [ 451.255834][T22345] new mount options do not match the existing superblock, will be ignored 08:58:52 executing program 4: sendto$unix(0xffffffffffffffff, &(0x7f0000000280)="9b8fc53c0858c44041cb1e8675aa6726bc7650704c51bb4426d9980c83d7e0286eee483fab0c060ea0e8811fc9b94d486baf726ec67a", 0x36, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200"], 0x48}}, 0x0) 08:58:52 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:52 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x177, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x165, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}], 0x1, 0x1) 08:58:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 08:58:52 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in, @in=@loopback}, {@in=@remote, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'blake2s-160-x86\x00'}}}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0x144}}, 0x0) 08:58:52 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 451.617593][T22353] new mount options do not match the existing superblock, will be ignored 08:58:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000840)='ntfs\x00', &(0x7f0000000880)='./file0\x00', 0x200, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000380)="d0248e02ef6a64beab16b60a8c782b4cc582b938b8e8f92cbc110a4462c720ea9ad0a716807a764f862c47175fcba92ccf646d0c9cf36e2d354cf98f247d38e8d4a28994bc84cefc6e2fb0101341", 0x4e, 0x3}], 0x208c04, &(0x7f0000000100)) 08:58:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{}], 0x1, 0x1) 08:58:52 executing program 3: exit(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {0x1a}}, 0x14}}, 0x0) 08:58:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_dev$vcsn(0x0, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 451.779886][T22371] new mount options do not match the existing superblock, will be ignored 08:58:52 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x0, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0xac08) 08:58:52 executing program 2: timer_create(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x0) 08:58:52 executing program 2: timer_create(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_io_uring_setup(0x1d58, &(0x7f0000000100)={0x0, 0x69f0, 0x8}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) [ 452.197563][T22383] new mount options do not match the existing superblock, will be ignored 08:58:52 executing program 2: timer_create(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x0) 08:58:52 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 452.285997][T22397] new mount options do not match the existing superblock, will be ignored 08:58:53 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x82, &(0x7f0000000080)={r3}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e25, @local}}, 0x9, 0x401}, 0x90) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r5, 0x80047455, &(0x7f0000000080)) 08:58:53 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x134) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) poll(&(0x7f0000000300)=[{r1}], 0x1, 0x0) [ 452.639492][T22404] new mount options do not match the existing superblock, will be ignored 08:58:53 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x0, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r1, r2, 0x0, 0x8000fffffffe) 08:58:53 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:55 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000840)='ntfs\x00', &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@dmask={'dmask'}}, {@uid={'uid'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 08:58:55 executing program 1: symlink(&(0x7f0000000300)='..', &(0x7f00000002c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x9) 08:58:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000280)='./file1\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:58:55 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:55 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x0, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) 08:58:55 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 455.221150][T22421] o2cb: This node has not been configured. [ 455.241814][T22421] o2cb: Cluster check failed. Fix errors before retrying. [ 455.267617][T22428] o2cb: This node has not been configured. [ 455.274911][T22428] o2cb: Cluster check failed. Fix errors before retrying. [ 455.284222][T22428] (syz-executor.1,22428,0):user_dlm_register:667 ERROR: status = -22 [ 455.289228][T22421] (syz-executor.4,22421,1):user_dlm_register:667 ERROR: status = -22 [ 455.294674][T22428] (syz-executor.1,22428,0):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file1" 08:58:55 executing program 3: io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) [ 455.309870][T22421] (syz-executor.4,22421,1):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file1" [ 455.328344][T22428] o2cb: This node has not been configured. [ 455.336397][T22421] o2cb: This node has not been configured. [ 455.343229][T22428] o2cb: Cluster check failed. Fix errors before retrying. [ 455.347816][T22421] o2cb: Cluster check failed. Fix errors before retrying. [ 455.361796][T22428] (syz-executor.1,22428,0):user_dlm_register:667 ERROR: status = -22 [ 455.365836][T22421] (syz-executor.4,22421,1):user_dlm_register:667 ERROR: status = -22 [ 455.373865][T22428] (syz-executor.1,22428,0):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file0" [ 455.384427][T22421] (syz-executor.4,22421,1):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file0" 08:58:55 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 455.417566][T22434] o2cb: This node has not been configured. [ 455.435296][T22434] o2cb: Cluster check failed. Fix errors before retrying. [ 455.452506][T22434] (syz-executor.1,22434,1):user_dlm_register:667 ERROR: status = -22 08:58:56 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) [ 455.467809][T22429] o2cb: This node has not been configured. [ 455.473792][T22434] (syz-executor.1,22434,1):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file1" [ 455.478153][T22429] o2cb: Cluster check failed. Fix errors before retrying. [ 455.543255][T22429] (syz-executor.4,22429,0):user_dlm_register:667 ERROR: status = -22 [ 455.562653][T22443] o2cb: This node has not been configured. [ 455.569061][T22443] o2cb: Cluster check failed. Fix errors before retrying. [ 455.579105][T22429] (syz-executor.4,22429,1):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file1" [ 455.588302][T22443] (syz-executor.1,22443,0):user_dlm_register:667 ERROR: status = -22 [ 455.607247][T22443] (syz-executor.1,22443,0):dlmfs_mkdir:466 ERROR: Error -22 could not register domain "file1" [ 456.460762][ T0] NOHZ: local_softirq_pending 08 [ 457.732330][ T0] NOHZ: local_softirq_pending 08 08:58:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:58:58 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x1c, r0, 0x1, 0x0, 0x0, {0x1a}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}]}, 0x1c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000130400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b00010067656e6576650000180000000000000000000200ac1414007639080001000000"], 0x48}}, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) 08:58:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x23, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) 08:58:58 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:58:58 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x17b, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x169, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x4, 0x24, 0x13, 0x4}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:58:58 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:58 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:58:58 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:58:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x25) 08:58:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:58:58 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) [ 458.403056][T22474] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:01 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:01 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:59:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000000)='./file0/file0\x00', 0x0) 08:59:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 08:59:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:01 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x17b, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x169, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x4, 0x24, 0x13, 0x4}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:01 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) clone(0x27300900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) 08:59:01 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:59:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x38, 0x10, 0x413, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PMTUDISC={0x5, 0xa, 0x1}]}}}]}, 0x38}}, 0x0) 08:59:01 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) 08:59:01 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:59:04 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x7f}]}}]}, 0x60}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xe64}}]}, 0x34}}, 0x0) 08:59:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) 08:59:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:04 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:59:04 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x17b, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x169, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x4, 0x24, 0x13, 0x4}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:04 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000540)) 08:59:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) [ 464.367219][T22516] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 464.394791][T22516] sch_tbf: burst 127 is lower than device veth3 mtu (1514) ! 08:59:05 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, 0x0) 08:59:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x70, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x900}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x40, 0x2, [@TCA_CGROUP_ACT={0x3c, 0x1, [@m_xt={0x38, 0x0, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}]}, {0x4}}}]}]}}]}, 0x70}}, 0x0) [ 464.429860][T22516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 464.447611][T22516] sch_tbf: burst 127 is lower than device veth3 mtu (1514) ! [ 464.456313][T22528] sch_tbf: burst 127 is lower than device veth3 mtu (1514) ! 08:59:05 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, 0x0) 08:59:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x2000000000f, &(0x7f0000f10000)=0x2, 0x4) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e224e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 464.534251][T22534] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 464.574088][T22534] HTB: quantum of class FFFF0900 is small. Consider r2q change. [ 466.049587][ T0] NOHZ: local_softirq_pending 08 08:59:07 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, 0x0) 08:59:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 08:59:07 executing program 1: io_submit(0x0, 0x4f, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) 08:59:07 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:07 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x199, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x187, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x22, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x7f}]}}]}, 0x60}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newqdisc={0x3c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_LIMIT={0x8}]}}]}, 0x3c}}, 0x0) 08:59:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 467.454998][T22558] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 467.533119][T22565] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 467.544826][T22564] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.562647][T22564] sch_tbf: burst 127 is lower than device veth7 mtu (1514) ! [ 467.572753][T22564] sch_tbf: burst 127 is lower than device veth7 mtu (1514) ! 08:59:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/2376]}, 0x9c0) 08:59:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) [ 467.582923][T22572] sch_tbf: burst 127 is lower than device veth7 mtu (1514) ! [ 467.601115][T22573] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:08 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xab, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000200)) 08:59:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 467.633275][T22576] ebt_among: wrong size: 1048 against expected 1320, rounded to 1320 [ 467.670478][T22580] ebt_among: wrong size: 1048 against expected 1320, rounded to 1320 08:59:08 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) dup3(r1, r2, 0x0) dup2(r0, r3) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) [ 467.680787][T22582] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:10 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1, 0x2, 0x0}) 08:59:10 executing program 1: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xafS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xb8\xf8\xe4~\a\x00\x00\x00\xf78\xf1\'\xdfv\x98\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x0e\x00\x00\x00\x7f\xf4tW.\x81\n\xf3\v\x8d\x12\x06a\x91\x9b\x8cxd\x06\xa7k\xf9\x85\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xb1\xb34\xfcUj\x1ad:#\x96\xf9\xd3\xcd\xc0ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xecl\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\b\x00\x00\x00\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \x00\x00\x00\x00\x00\xcc\x1b\xb9\x06zQ]\x8b\xef\xd2[o\xe3\xaa\xe0\xc9W\x18J', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x10, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 08:59:10 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x199, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x187, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x22, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x2, 0x0) 08:59:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 470.486785][T22596] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:11 executing program 4: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/41) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0xe, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c0000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400000005815500040002000000"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 08:59:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/prev\x00') pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="a5", 0x1}], 0x1, 0x0, 0x0, 0x13) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, &(0x7f00000001c0), 0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r3, 0x0) dup2(r1, r4) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r5 = syz_open_procfs(0x0, 0x0) write$P9_RLINK(r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') write$P9_RLINK(r6, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000000)={0x80000003}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 470.546953][T22611] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 470.624219][T22619] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 471.128126][T22617] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.136061][T22617] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.024409][T22617] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 472.108937][T22617] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 473.054463][T22620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 473.062147][T22620] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 473.071420][T22620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 473.080537][T22620] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.128280][T22620] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:59:14 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:14 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x9, 0x8, 0x6, 0x3, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000000), 0x7, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000480), 0x0, 0x1, r0}, 0x38) 08:59:14 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x199, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x187, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x22, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:14 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 473.506656][T22634] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x5) [ 473.574463][T22640] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 473.616888][ T29] audit: type=1326 audit(1596704354.127:19): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=22641 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45fb1a code=0x0 08:59:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4020aeb2, &(0x7f0000000200)) 08:59:14 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:14 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:14 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 473.751841][T22650] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 473.784882][T22654] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 474.404322][ T29] audit: type=1326 audit(1596704354.917:20): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=22641 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45fb1a code=0x0 08:59:17 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:17 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000000c0)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xafS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xb8\xf8\xe4~\a\x00\x00\x00\xf78\xf1\'\xdfv\x98\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x0e\x00\x00\x00\x7f\xf4tW.\x81\n\xf3\v\x8d\x12\x06a\x91\x9b\x8cxd\x06\xa7k\xf9\x85\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xb1\xb34\xfcUj\x1ad:#\x96\xf9\xd3\xcd\xc0ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xecl\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\b\x00\x00\x00\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \x00\x00\x00\x00\x00\xcc\x1b\xb9\x06zQ]\x8b\xef\xd2[o\xe3\xaa\xe0\xc9W\x18J', 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x10, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 08:59:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:17 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1a8, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x196, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x31, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x1, 0x0, 0x6000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x68002100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x100, 0xffffffffffffffff, 0x2000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}, 0x10) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:59:17 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) [ 476.539906][T22663] IPVS: ftp: loaded support on port[0] = 21 [ 476.548641][T22664] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 476.556849][T22665] ptrace attach of "/root/syz-executor.1"[22663] was attempted by "/root/syz-executor.1"[22665] 08:59:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:17 executing program 4: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 476.609412][T22683] IPVS: ftp: loaded support on port[0] = 21 08:59:17 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:17 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) [ 476.660377][T22692] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 476.702360][T22702] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 476.883859][T22700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 476.892975][T22700] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 476.909917][T22700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 476.931178][T22700] 8021q: adding VLAN 0 to HW filter on device team0 [ 476.987838][T22700] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 477.029019][T22700] syz-executor.4 (22700) used greatest stack depth: 8840 bytes left 08:59:20 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:20 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:20 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:20 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1a8, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x196, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x31, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:20 executing program 4: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 08:59:20 executing program 1: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 08:59:20 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 479.587221][T22731] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:20 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:20 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) [ 479.683484][T22740] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:20 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r0 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200)=ANY=[], 0xdf) [ 479.788871][T22746] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 480.673247][T22734] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.680700][T22734] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.568845][T22734] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 481.649544][T22734] batman_adv: batadv0: Interface deactivated: batadv_slave_1 08:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:23 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:23 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1a8, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x196, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x31, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) [ 482.624570][T22753] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 482.688009][T22739] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 482.695746][T22739] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 482.730666][T22739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 482.740839][T22739] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 482.750171][T22739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 482.759004][T22739] 8021q: adding VLAN 0 to HW filter on device team0 [ 482.806828][T22739] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 482.833115][T22738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 482.842086][T22738] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 482.850577][T22738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 482.859316][T22738] 8021q: adding VLAN 0 to HW filter on device team0 08:59:23 executing program 4: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 08:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:23 executing program 1: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 482.916894][T22738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) [ 482.961374][T22761] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 483.029112][T22768] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:23 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1af, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x19d, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x38, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) [ 483.105531][T22774] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 483.190311][T22779] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 484.057270][T22769] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 484.065211][T22769] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 484.100079][T22769] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 484.112074][T22769] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 484.120231][T22769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 484.129084][T22769] 8021q: adding VLAN 0 to HW filter on device team0 [ 484.187676][T22771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 484.196883][T22771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 484.205436][T22771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 484.214585][T22771] 8021q: adding VLAN 0 to HW filter on device team0 08:59:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:26 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1af, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x19d, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x38, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x40, 0x6, 0x3, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000000), 0x7, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000480), 0x0, 0x1, r0}, 0x38) 08:59:26 executing program 4: mkdir(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0fad7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0xac1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setgroups(0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="080029bd7000fbdbdf250400"], 0x1c}}, 0x4000080) setregid(0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 08:59:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xcc0, 0x6000, &(0x7f0000000280)="b9ff0300600d698c389e14f06558fcffffff000040006321000e86dd0001080006040062050000002fbd53039e6aab84181aa5feffff07000000fe0000000000000000", 0x0, 0xfc, 0x60000000, 0x0, 0x0, &(0x7f0000000140)="486e90decd837f7e62c4f903a15a12d35c31c761c1da726b54ccd47736cdde536c0b3e75ef5c913757491df3e38f5cc44e6847bdc594358967964f76aa9f31a6", &(0x7f0000000e00)="e2cf5bb7e5746a6740aebad755a0c2f42d131e1493afc9154aeae4ff8916e84fae2dbac6ba23acee58596467b1d68d886cf44ae164800edec75a809bcc514384c499930e5c18337dcbedb8e326b8b42e4ba1acb01b73cdcef9b719fb5ce7b547f9324fbebb24d0fd464fa10fd1fccf19f0f42441b5b27a5c93b29874c85ae55fd3cce1e8b903601c"}, 0x29) [ 485.666075][T22787] net_ratelimit: 2 callbacks suppressed [ 485.666105][T22787] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:26 executing program 1: r0 = creat(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x400000, 0x100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r2, 0x1, 0x0, 0x25dfdbfe, {0xf}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x400885d) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20000050) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00240001dd4e9767bb724d5e5e1bd8edfe3d9d3d0562c7855e0cfe6a33077d3aa0ac22a5b4a08faddd261884e5813e520a08c93fc95c0000fc", @ANYBLOB="000126bd7000fbdbdf25010000000a0009000000000000000000050038000000000005002f00000000000800"], 0x38}}, 0x40081) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000100)={'veth0_vlan\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(0x0, 0xc8) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x9) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 08:59:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 485.798311][T22800] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 485.893863][T22809] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 486.398522][T22794] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 486.408585][T22794] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 486.419930][T22794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 486.432329][T22794] 8021q: adding VLAN 0 to HW filter on device team0 [ 486.496434][T22794] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:59:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:29 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1af, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x19d, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x38, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x51, 0x0, 0x0, 0x70bd2d, 0x0, {{}, {}, {0x4c}}}, 0x24}}, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 08:59:29 executing program 1: r0 = creat(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x400000, 0x100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x34, r2, 0x1, 0x0, 0x25dfdbfe, {0xf}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x400885d) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20000050) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00240001dd4e9767bb724d5e5e1bd8edfe3d9d3d0562c7855e0cfe6a33077d3aa0ac22a5b4a08faddd261884e5813e520a08c93fc95c0000fc", @ANYBLOB="000126bd7000fbdbdf25010000000a0009000000000000000000050038000000000005002f00000000000800"], 0x38}}, 0x40081) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000100)={'veth0_vlan\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(0x0, 0xc8) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x9) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 08:59:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xab, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000001040102f000000000000000000000000500010001"], 0x28}}, 0x0) 08:59:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:29 executing program 1: [ 488.720759][T22823] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 08:59:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:29 executing program 1: 08:59:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) [ 488.770955][T22826] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 488.784352][T22828] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 488.842363][T22836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 08:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 08:59:32 executing program 1: 08:59:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:32 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 4: 08:59:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b3, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a1, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3c, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:32 executing program 1: 08:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 08:59:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:32 executing program 4: 08:59:32 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 1: 08:59:32 executing program 4: 08:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:32 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:32 executing program 1: 08:59:32 executing program 4: 08:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b3, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a1, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3c, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:32 executing program 1: 08:59:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:32 executing program 1: 08:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 4: 08:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0, 0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:32 executing program 4: 08:59:32 executing program 1: 08:59:33 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b3, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a1, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3c, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:33 executing program 4: 08:59:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:33 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:33 executing program 1: 08:59:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:33 executing program 4: 08:59:33 executing program 1: 08:59:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:33 executing program 1: 08:59:33 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:33 executing program 4: 08:59:33 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b5, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a3, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3e, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:33 executing program 1: 08:59:33 executing program 4: 08:59:33 executing program 0: pipe(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xe8ba, 0x0) 08:59:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:33 executing program 4: 08:59:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:34 executing program 1: 08:59:34 executing program 4: 08:59:34 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:34 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b5, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a3, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3e, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:34 executing program 1: 08:59:34 executing program 4: 08:59:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:34 executing program 4: 08:59:34 executing program 1: 08:59:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000240)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x3], @random="3aa258631481", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x86dd, [0x0]}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 08:59:34 executing program 1: 08:59:34 executing program 4: 08:59:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:37 executing program 1: 08:59:37 executing program 2: 08:59:37 executing program 4: 08:59:37 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b5, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a3, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3e, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:37 executing program 4: 08:59:37 executing program 1: 08:59:37 executing program 2: 08:59:37 executing program 4: 08:59:37 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:37 executing program 1: 08:59:40 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:40 executing program 4: 08:59:40 executing program 2: 08:59:40 executing program 1: 08:59:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:40 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:40 executing program 2: 08:59:40 executing program 1: 08:59:40 executing program 4: 08:59:40 executing program 1: 08:59:40 executing program 4: 08:59:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000001280)={0x0, @in, 0x3}, 0xa0) 08:59:43 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:43 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:43 executing program 4: 08:59:43 executing program 1: 08:59:43 executing program 2: 08:59:43 executing program 2: 08:59:43 executing program 1: 08:59:43 executing program 2: 08:59:43 executing program 4: 08:59:43 executing program 1: 08:59:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:46 executing program 4: 08:59:46 executing program 2: 08:59:46 executing program 1: 08:59:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:46 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:46 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:46 executing program 1: 08:59:46 executing program 2: 08:59:46 executing program 4: 08:59:46 executing program 1: 08:59:46 executing program 4: 08:59:46 executing program 2: 08:59:46 executing program 1: 08:59:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:46 executing program 2: 08:59:46 executing program 1: 08:59:49 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:49 executing program 4: 08:59:49 executing program 2: 08:59:49 executing program 1: 08:59:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:49 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:49 executing program 2: 08:59:49 executing program 4: 08:59:49 executing program 1: 08:59:49 executing program 2: 08:59:49 executing program 4: 08:59:49 executing program 1: 08:59:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:52 executing program 2: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x0, 0x2}) 08:59:52 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x5, 0x1, 0x5, 0x0, 0x0, {0xa, 0x0, 0x2}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010048) 08:59:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000140)}, 0x20) 08:59:52 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) read(r0, &(0x7f00000000c0)=""/216, 0xd8) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) dup2(r2, r1) 08:59:52 executing program 1: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00', @ANYBLOB="00000000000200000008"], 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0xff9a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 08:59:52 executing program 4: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000), 0xf84e9754b335f134}) 08:59:52 executing program 2: clock_settime(0x0, &(0x7f0000000040)) 08:59:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\b\x00'}) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x17) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$TCXONC(r3, 0x540a, 0x1) 08:59:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000005900)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001700)=""/93, 0x5d}], 0x1}}], 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/raw\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x161, 0x0) 08:59:55 executing program 2: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f630c40"], 0x0, 0x0, 0x0}) 08:59:55 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:55 executing program 1: clock_gettime(0x5, 0x0) clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000100)={r0, r1+60000000}) clock_gettime(0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_settime(0x0, 0x0) 08:59:55 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 08:59:55 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 08:59:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) 08:59:55 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) [ 514.963294][T23099] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 514.975362][T23101] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 08:59:55 executing program 4: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="02630440"], 0x0, 0x0, 0x0}) 08:59:55 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 08:59:55 executing program 2: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000100)={0x18, 0x2, 0x0, 0x0, 0x0, 0x0}) [ 515.015902][T23112] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 515.051292][T23116] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 08:59:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) 08:59:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 08:59:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 08:59:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/raw\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f0000000100)=""/226, 0xe2}], 0x1, 0x9, 0x0) 08:59:58 executing program 2: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x7fc00000) 08:59:58 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 08:59:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 08:59:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r0, 0x0) 08:59:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000140)='n'}, 0x20) [ 517.956427][T23136] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 08:59:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) 08:59:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) [ 518.002473][T23144] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 08:59:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x4, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 08:59:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x21) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040), 0x4) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r4, 0x0, 0x10005, 0x0) 08:59:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[], 0xdf) [ 518.053153][T23156] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) 09:00:01 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180), 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:01 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvfrom$unix(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) splice(r0, 0x0, r1, 0x0, 0x126f2, 0x0) 09:00:01 executing program 4: fsopen(0x0, 0xc919b273f1625b0a) 09:00:01 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:01 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 520.973781][T23172] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08"], 0x0) 09:00:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) 09:00:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xdf) [ 521.055180][T23186] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, 0x0, 0xdf) 09:00:01 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:01 executing program 4: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)) 09:00:01 executing program 4: accept(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010048) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) [ 521.212308][T23204] new mount options do not match the existing superblock, will be ignored 09:00:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:04 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180), 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, 0x0, 0xdf) 09:00:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:04 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 524.038893][T23214] new mount options do not match the existing superblock, will be ignored [ 524.073971][T23219] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$UHID_SET_REPORT_REPLY(r1, 0x0, 0xdf) 09:00:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 524.119293][T23227] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 524.143868][T23231] new mount options do not match the existing superblock, will be ignored 09:00:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40084503, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, "646a6076ce6a385da3a21f4c36a0edce4bf34eb8a2f8a74d407625a133bd9b56"}) keyctl$invalidate(0x15, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/153, 0x99}, {0x0}], 0x2) [ 524.160836][T23234] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:04 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 524.232704][T23241] new mount options do not match the existing superblock, will be ignored 09:00:07 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180), 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:07 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:07 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:07 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:07 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 527.114525][T23256] new mount options do not match the existing superblock, will be ignored 09:00:07 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:07 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:07 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 527.154488][T23258] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:07 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 527.242840][T23269] new mount options do not match the existing superblock, will be ignored [ 527.257732][T23270] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:07 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 527.305545][T23274] new mount options do not match the existing superblock, will be ignored 09:00:10 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:10 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r3) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:10 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:10 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r3) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 530.176372][T23289] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 530.199390][T23292] new mount options do not match the existing superblock, will be ignored 09:00:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:10 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) dup2(r2, r3) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 530.235871][T23298] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 530.276630][T23301] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 530.277290][T23303] new mount options do not match the existing superblock, will be ignored 09:00:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:13 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:13 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 533.242290][T23318] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 533.264978][T23320] new mount options do not match the existing superblock, will be ignored 09:00:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:13 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 533.282349][T23324] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 533.342278][T23330] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 533.363783][T23333] new mount options do not match the existing superblock, will be ignored [ 533.427240][T23338] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:16 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:16 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x0, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:16 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:16 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 536.288137][T23346] new mount options do not match the existing superblock, will be ignored [ 536.299646][T23345] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:16 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 536.387455][T23359] new mount options do not match the existing superblock, will be ignored 09:00:17 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 536.517058][T23367] new mount options do not match the existing superblock, will be ignored [ 538.362199][ T0] NOHZ: local_softirq_pending 08 [ 538.368611][ T0] NOHZ: local_softirq_pending 08 09:00:19 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:19 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:19 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:19 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x0, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:19 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:19 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:19 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 539.350839][T23377] new mount options do not match the existing superblock, will be ignored 09:00:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 539.452592][T23393] new mount options do not match the existing superblock, will be ignored 09:00:22 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:22 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:22 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:22 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x0, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:23 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 542.429723][T23408] new mount options do not match the existing superblock, will be ignored [ 542.436391][T23409] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:23 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:23 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 542.572174][T23426] new mount options do not match the existing superblock, will be ignored 09:00:25 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:25 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:25 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:25 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x0, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:25 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:26 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setreuid(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 545.459520][T23441] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 545.479815][T23444] new mount options do not match the existing superblock, will be ignored 09:00:26 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setreuid(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:26 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 545.541994][T23450] new mount options do not match the existing superblock, will be ignored 09:00:26 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) setreuid(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 545.616749][T23456] new mount options do not match the existing superblock, will be ignored [ 545.669753][T23463] new mount options do not match the existing superblock, will be ignored 09:00:28 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:28 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:28 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:28 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x0, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:28 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:29 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:29 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 548.480495][T23470] new mount options do not match the existing superblock, will be ignored [ 548.513985][T23473] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:29 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:29 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 548.559507][T23478] new mount options do not match the existing superblock, will be ignored 09:00:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:29 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 548.614713][T23483] new mount options do not match the existing superblock, will be ignored [ 548.680431][T23488] new mount options do not match the existing superblock, will be ignored 09:00:32 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:32 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 09:00:32 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x0, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:32 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:32 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 551.554382][T23497] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 551.557785][T23498] new mount options do not match the existing superblock, will be ignored 09:00:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:32 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 09:00:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 551.618373][T23506] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 551.628200][T23510] new mount options do not match the existing superblock, will be ignored [ 551.672013][T23513] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:35 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:35 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:35 executing program 3: r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:35 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:35 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:35 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:35 executing program 3: r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:35 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 554.594052][T23525] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 554.610224][T23529] new mount options do not match the existing superblock, will be ignored 09:00:35 executing program 3: r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:35 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:35 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:35 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 554.666133][T23538] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 554.684123][T23540] new mount options do not match the existing superblock, will be ignored [ 554.738745][T23543] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 554.753322][T23547] new mount options do not match the existing superblock, will be ignored 09:00:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:38 executing program 1: pipe(&(0x7f0000000100)) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:38 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:38 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:38 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:38 executing program 3: mkdir(0x0, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:38 executing program 1: pipe(&(0x7f0000000100)) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:38 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:38 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 557.657000][T23557] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:38 executing program 1: pipe(&(0x7f0000000100)) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:38 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 557.714197][T23568] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 557.763475][T23574] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:41 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:41 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:41 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:41 executing program 2: mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:41 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:41 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:41 executing program 2: mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:41 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 560.709192][T23584] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:41 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:41 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:41 executing program 2: mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 560.761873][T23596] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 560.826522][T23602] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:44 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:44 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:44 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:44 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:44 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:44 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:44 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:44 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 563.761377][T23616] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:44 executing program 1: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:44 executing program 1: pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 563.802846][T23622] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 563.835177][T23629] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:44 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:44 executing program 1: pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 563.864971][T23632] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 563.916359][T23640] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:47 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:47 executing program 1: pipe(&(0x7f0000000100)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:47 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:47 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 566.760153][T23620] syz-executor.0 (23620) used greatest stack depth: 8672 bytes left [ 566.797594][T23645] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:47 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 566.854945][T23659] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:47 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:47 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:47 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 566.907345][T23666] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 566.973911][T23674] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:47 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:50 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:50 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:50 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:50 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x0, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 569.812971][T23686] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:50 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:50 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 569.862238][T23699] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 569.893989][T23702] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 569.965039][T23708] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:53 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:53 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:53 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:53 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x0, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:53 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 572.919399][T23726] new mount options do not match the existing superblock, will be ignored [ 572.932107][T23721] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:00:53 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:53 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 572.988137][T23733] new mount options do not match the existing superblock, will be ignored 09:00:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:53 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 573.051896][T23738] new mount options do not match the existing superblock, will be ignored [ 573.108634][T23744] new mount options do not match the existing superblock, will be ignored 09:00:56 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:56 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:56 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:56 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x0, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:56 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:56 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 575.981668][T23756] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 575.983497][T23757] new mount options do not match the existing superblock, will be ignored 09:00:56 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:56 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:56 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 576.071476][T23768] new mount options do not match the existing superblock, will be ignored 09:00:56 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:56 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:56 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) [ 576.162141][T23777] new mount options do not match the existing superblock, will be ignored 09:00:56 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x0, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:57 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:57 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 576.796980][T23791] new mount options do not match the existing superblock, will be ignored 09:00:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:57 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:57 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x0, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:57 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:57 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 576.941839][T23809] new mount options do not match the existing superblock, will be ignored 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:57 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 577.037056][T23824] new mount options do not match the existing superblock, will be ignored 09:00:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 577.141406][T23840] new mount options do not match the existing superblock, will be ignored 09:00:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:58 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x0, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:58 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:58 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 577.582026][T23852] new mount options do not match the existing superblock, will be ignored 09:00:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:58 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 577.646476][T23860] new mount options do not match the existing superblock, will be ignored [ 577.722242][T23868] new mount options do not match the existing superblock, will be ignored [ 578.039644][ T0] NOHZ: local_softirq_pending 08 09:00:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:58 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:58 executing program 4: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:58 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:58 executing program 4: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:58 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:59 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 578.426986][T23876] new mount options do not match the existing superblock, will be ignored 09:00:59 executing program 4: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:59 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) getdents(r0, &(0x7f00000000c0)=""/166, 0xa6) 09:00:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:59 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:59 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 578.498223][T23887] new mount options do not match the existing superblock, will be ignored 09:00:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:59 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:59 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 578.614467][T23899] new mount options do not match the existing superblock, will be ignored 09:00:59 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:00:59 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:00:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:59 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:59 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:59 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 09:00:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:00:59 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:00:59 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 578.989607][T23914] new mount options do not match the existing superblock, will be ignored 09:00:59 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 09:00:59 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:00:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 579.113129][T23937] new mount options do not match the existing superblock, will be ignored 09:01:00 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:00 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:00 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:00 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, 0x0, 0x0) 09:01:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:00 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x0, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 579.588736][T23945] new mount options do not match the existing superblock, will be ignored 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:00 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, 0x0, 0x0) 09:01:00 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 579.715074][T23967] new mount options do not match the existing superblock, will be ignored 09:01:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c000380060002000000000014000500"/94], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:00 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, 0x0) 09:01:00 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getdents(r0, 0x0, 0x0) 09:01:00 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c000380060002000000000014000500"/94], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:00 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 580.193969][T23972] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 580.201742][T23977] new mount options do not match the existing superblock, will be ignored [ 580.239581][T23981] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:03 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x0, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c000380060002000000000014000500"/94], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:03 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:03 executing program 3: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)=0x80000000) 09:01:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:03 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, 0x0) 09:01:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e20000006"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:03 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 09:01:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e20000006"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:03 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setreuid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:03 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r2 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280)='&', &(0x7f0000000040)=@tcp=r0}, 0x20) [ 582.701142][T23999] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 582.711318][T23998] new mount options do not match the existing superblock, will be ignored [ 582.740117][T24004] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 582.784417][T24010] new mount options do not match the existing superblock, will be ignored [ 582.804916][T24012] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:06 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x0, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:06 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e20000006"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x4, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 09:01:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:06 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, 0x0) 09:01:06 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac141400"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 585.737195][T24026] new mount options do not match the existing superblock, will be ignored [ 585.754239][T24029] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.793299][T24036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.805876][T24036] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.808738][T24040] new mount options do not match the existing superblock, will be ignored [ 585.816102][T24036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:06 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac141400"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:06 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 585.836692][T24036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:06 executing program 3: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb323, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x20}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\"'], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 585.883167][T24042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.901642][T24042] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.909461][T24046] new mount options do not match the existing superblock, will be ignored [ 585.926517][T24042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 585.942029][T24042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:09 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac141400"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:09 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x5, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\b\x00'}) r4 = syz_open_pts(r1, 0x4000000000000002) r5 = dup3(r4, r0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYRES64], 0x17) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$TCXONC(r5, 0x540a, 0x1) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 588.800167][T24060] new mount options do not match the existing superblock, will be ignored [ 588.804256][T24061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:09 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:09 executing program 3: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)={0x0, 0x2}) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:09 executing program 3: poll(0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000000000)=0xfffffffc, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 588.885218][T24075] new mount options do not match the existing superblock, will be ignored 09:01:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 589.007624][T24096] new mount options do not match the existing superblock, will be ignored 09:01:09 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:09 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:09 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:09 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 09:01:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 589.348563][T24110] new mount options do not match the existing superblock, will be ignored 09:01:10 executing program 3: clone(0x14100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000100)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0}) 09:01:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000000008"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000000008"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 589.814959][T24122] new mount options do not match the existing superblock, will be ignored 09:01:10 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGPTLCK(r1, 0x80045439, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c000280050001000000000008"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:10 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) [ 589.935000][T24142] new mount options do not match the existing superblock, will be ignored 09:01:10 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c00028005000100000000000800"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:10 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) 09:01:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c00028005000100000000000800"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x80, 0x0, 0x0, 0x0, 0x5, 0x400000000000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f000000d900)=[{{0x0, 0x0, &(0x7f0000005d80)=[{0x0}], 0x1}}, {{&(0x7f00000072c0)=@l2={0x1f, 0x1, @none, 0x9}, 0x80, &(0x7f00000084c0)}}], 0x2, 0x0) [ 590.252862][T24155] new mount options do not match the existing superblock, will be ignored 09:01:10 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c00028005000100000000000800"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvfrom$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:10 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x20) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, 0x0, &(0x7f0000000480)=""/244}, 0x20) 09:01:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 590.479789][T24171] new mount options do not match the existing superblock, will be ignored 09:01:11 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r1, 0x0, 0xe8ba, 0x0) 09:01:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:11 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:11 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:11 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 591.070401][T24185] __nla_validate_parse: 12 callbacks suppressed [ 591.070410][T24185] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 591.092476][T24190] new mount options do not match the existing superblock, will be ignored 09:01:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:11 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:11 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 591.124469][T24198] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 591.200691][T24206] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 591.201474][T24209] new mount options do not match the existing superblock, will be ignored 09:01:12 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, 0x0, 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:12 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) 09:01:12 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, 0x0, 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 591.939199][T24223] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 591.940094][T24222] new mount options do not match the existing superblock, will be ignored 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x90) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="c000000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414000c00028005000100000000005c00068008000100e00000010c00038006000200000000001400050000000000000000000000000000000001140005000000000000000000000000000008000000000380060002004e230000060002004e200000060002004e240000240002801400018008000100ac14140008000200ffffffff0c0002800500010000000000080007"], 0xc0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) [ 592.032031][T24234] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:12 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, 0x0, 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 592.087437][T24242] new mount options do not match the existing superblock, will be ignored 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe8ba, 0x0) [ 592.159188][T24251] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 09:01:12 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:12 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x0, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:12 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:12 executing program 1: ioperm(0x7ff, 0x1, 0x0) 09:01:12 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe8ba, 0x0) 09:01:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xff01) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xe8ba, 0x0) 09:01:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000010000003cc00b0079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_err_abort='data_err=abort'}]}) 09:01:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 592.505012][T24269] new mount options do not match the existing superblock, will be ignored 09:01:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000633a77fbac14143fee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 09:01:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 09:01:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0x10, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 592.622186][T24283] new mount options do not match the existing superblock, will be ignored 09:01:13 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x0, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 09:01:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 09:01:13 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) 09:01:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xe8ba, 0x0) 09:01:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:13 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 593.097182][T24296] new mount options do not match the existing superblock, will be ignored 09:01:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, 0x0, 0x0) 09:01:13 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 09:01:13 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0xe8ba, 0x0) [ 593.204166][T24313] new mount options do not match the existing superblock, will be ignored 09:01:14 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 09:01:14 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x0, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, 0x0, 0x0) 09:01:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) recvmsg(r1, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002123) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) poll(0x0, 0x0, 0x204) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f6}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xff01) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 593.688453][T24331] new mount options do not match the existing superblock, will be ignored 09:01:14 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, 0x0, 0x0) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x2}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x50}}, 0x0) 09:01:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000440)=ANY=[@ANYBLOB="f7f17489"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f000000d900)=[{{0x0, 0x0, &(0x7f0000005d80)=[{&(0x7f0000000400)="e2ee", 0x2}, {0x0}], 0x2}}, {{&(0x7f00000072c0)=@l2={0x1f, 0x1, @none, 0x9}, 0x80, &(0x7f00000084c0)}}], 0x2, 0x0) [ 593.801149][T24346] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 593.811284][T24348] new mount options do not match the existing superblock, will be ignored 09:01:14 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x0, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100), 0x0) 09:01:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x2001009, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0/file0\x00') 09:01:14 executing program 0: 09:01:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:14 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x271, 0x0, 0x0) [ 594.250064][T24364] new mount options do not match the existing superblock, will be ignored 09:01:14 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100), 0x0) 09:01:14 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:14 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) [ 594.356809][T24384] new mount options do not match the existing superblock, will be ignored 09:01:15 executing program 3: exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:15 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x0, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100), 0x0) 09:01:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000280)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f9808853a699937d63a0e0206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)={[{@journal_ioprio={'journal_ioprio'}}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}]}) 09:01:15 executing program 1: openat$vga_arbiter(0xffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfd53) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 09:01:15 executing program 3: exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:15 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) [ 594.827606][T24401] new mount options do not match the existing superblock, will be ignored 09:01:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{0x0}], 0x1) 09:01:15 executing program 3: exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="0f0536660f3a633ea466bad004ec9a13000000fb00f00fb18500000000670f01cb660f388054fe04660f3a0aef07cf66ba410066ed", 0x92}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:01:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:15 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 594.922293][T24412] new mount options do not match the existing superblock, will be ignored [ 594.949443][T24415] ptrace attach of "/root/syz-executor.1"[24411] was attempted by "/root/syz-executor.1"[24415] 09:01:15 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x0, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="0f0536660f3a633ea466bad004ec9a13000000fb00f00fb18500000000670f01cb660f388054fe04660f3a0aef07cf66ba410066ed", 0x92}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r4, 0xae80, 0x0) 09:01:15 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) 09:01:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{0x0}], 0x1) 09:01:15 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:15 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) 09:01:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{0x0}], 0x1) 09:01:16 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 595.415720][T24435] new mount options do not match the existing superblock, will be ignored [ 595.438736][T24440] ptrace attach of "/root/syz-executor.1"[24437] was attempted by "/root/syz-executor.1"[24440] 09:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:16 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) [ 595.494624][T24445] ptrace attach of "/root/syz-executor.1"[24444] was attempted by "/root/syz-executor.1"[24445] [ 595.518996][T24450] new mount options do not match the existing superblock, will be ignored [ 595.601405][T24458] ptrace attach of "/root/syz-executor.1"[24457] was attempted by "/root/syz-executor.1"[24458] 09:01:16 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x0, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:16 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)}], 0x1) 09:01:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:16 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) 09:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:16 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:16 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) wait4(0x0, 0x0, 0x0, 0x0) [ 596.002889][T24470] new mount options do not match the existing superblock, will be ignored [ 596.003094][T24472] ptrace attach of "/root/syz-executor.1"[24469] was attempted by "/root/syz-executor.1"[24472] 09:01:16 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:16 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)}], 0x1) 09:01:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 596.160620][T24485] ptrace attach of "/root/syz-executor.1"[24483] was attempted by "/root/syz-executor.1"[24485] [ 596.181769][T24487] new mount options do not match the existing superblock, will be ignored 09:01:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:17 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x0, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:17 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)}], 0x1) 09:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 596.615393][T24499] new mount options do not match the existing superblock, will be ignored 09:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:17 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x3c1, 0x3, 0x378, 0x1d0, 0xc8, 0x0, 0x1d0, 0x5803, 0x2a8, 0x2e8, 0x2e8, 0x2a8, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'bridge0\x00', 'geneve1\x00'}, 0x0, 0x190, 0x1d0, 0x0, {0x3ba, 0x2000000000000}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e67262c1fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x1}}, @common=@inet=@socket1={{0x28, 'socket\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @loopback, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) 09:01:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 596.743925][T24517] Cannot find add_set index 0 as target [ 596.805454][T24525] ptrace attach of "/root/syz-executor.1"[24523] was attempted by "/root/syz-executor.1"[24525] 09:01:17 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x0, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:17 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x200) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:01:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) socket$inet6(0xa, 0x3, 0x3) 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) socket$inet6(0xa, 0x3, 0x3) 09:01:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 597.202072][T24539] ptrace attach of "/root/syz-executor.1"[24536] was attempted by "/root/syz-executor.1"[24539] 09:01:17 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:17 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) socket$inet6(0xa, 0x3, 0x3) [ 597.270858][T24547] ptrace attach of "/root/syz-executor.1"[24546] was attempted by "/root/syz-executor.1"[24547] [ 597.405612][T24559] ptrace attach of "/root/syz-executor.1"[24558] was attempted by "/root/syz-executor.1"[24559] 09:01:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:18 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x0, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x80, 0x0, 0x0, 0x0, 0x5, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x2}) ioctl$KVM_X86_SETUP_MCE(r2, 0x9000aea4, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000d900)=[{{&(0x7f00000072c0)=@l2={0x1f, 0x1, @none, 0x9}, 0x80, &(0x7f00000084c0)}}], 0x1, 0x0) 09:01:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:18 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x200) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:01:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:18 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x0, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:18 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:18 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_GET_FP_MODE(0x2e) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x210b405, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x108020, &(0x7f00000001c0)={[{@commit={'commit', 0x3d, 0x37f2}}, {@orlov='orlov'}]}) getitimer(0x0, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x7, 0x240002) 09:01:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:18 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:18 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:18 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 09:01:19 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x0, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:19 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:19 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:19 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x46, 0x0, &(0x7f0000000100)="4d50b441e692763513ef874565580000ff0d00000000122e25d386dd227dcb6470faa27ed2a0ff3862c8112b9bd19802e274d7b70fe661176f27007b9631b3a0291d70d5f32d", 0x0, 0x3fb, 0x0, 0x66, 0xffffff02, &(0x7f0000000000), &(0x7f0000000380)="7045502c9fe7d72a5d725d07000000840c0fa18b214f01adde5b220866f34723aefcc876df83a6915a0a9aed8abea8fce9dca40354f218178eedfd571140c75e8aaafa38e2ecaa6ebfc27f5dc7301c0a85450d3cfc4ceee8968d0ab47f1d829da06a01f82ec4f14d3c692a59db27ece44a0e029488462d11e930e90d5deafb1b5af71d3cd3c053aa34bc8d000000"}, 0x40) 09:01:19 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:19 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:19 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:20 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) dup3(r5, r3, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r5, 0x8208ae63, &(0x7f0000000700)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xfffffffb, 0x0, [{}, {}, {}, {}, {0x0, 0x5}]}}) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x406000) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ftruncate(r1, 0x2008001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 09:01:20 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:20 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, 0x0, &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:21 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x406000) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ftruncate(r1, 0x2008001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 09:01:21 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, 0x0, &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 600.712863][T24737] __report_access: 1 callbacks suppressed [ 600.712875][T24737] ptrace attach of "/root/syz-executor.1"[24734] was attempted by "/root/syz-executor.1"[24737] 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, 0x0, &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ed, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x4a) [ 600.798800][T24747] ptrace attach of "/root/syz-executor.1"[24746] was attempted by "/root/syz-executor.1"[24747] 09:01:21 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x0, 0x0, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x93, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 09:01:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:21 executing program 1: perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) [ 601.272271][T24766] ptrace attach of "/root/syz-executor.1"[24763] was attempted by "/root/syz-executor.1"[24766] [ 601.292427][ T29] audit: type=1804 audit(1596704481.822:21): pid=24767 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir592688465/syzkaller.8IiP5R/910/file0" dev="sda1" ino=16374 res=1 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 601.415717][T24785] ptrace attach of "/root/syz-executor.1"[24782] was attempted by "/root/syz-executor.1"[24785] 09:01:22 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x0, 0x0, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:22 executing program 1: perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x9000aea4, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 1: perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 601.847881][T24799] ptrace attach of "/root/syz-executor.1"[24795] was attempted by "/root/syz-executor.1"[24799] 09:01:22 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0xa, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000140)) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) [ 601.907668][T24812] ptrace attach of "/root/syz-executor.1"[24811] was attempted by "/root/syz-executor.1"[24812] 09:01:22 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x0, 0x0, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:22 executing program 1: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, 0x0, 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:22 executing program 1: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 602.406891][T24837] ptrace attach of "/root/syz-executor.1"[24835] was attempted by "/root/syz-executor.1"[24837] 09:01:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, 0x0, 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 602.518449][T24851] ptrace attach of "/root/syz-executor.1"[24850] was attempted by "/root/syz-executor.1"[24851] 09:01:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 09:01:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:23 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}]}) 09:01:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, 0x0, 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, 0x0, 0x0) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 602.976102][T24865] ptrace attach of "/root/syz-executor.1"[24864] was attempted by "/root/syz-executor.1"[24865] 09:01:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, 0x0, 0x0) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) [ 603.046089][T24881] ptrace attach of "/root/syz-executor.1"[24879] was attempted by "/root/syz-executor.1"[24881] 09:01:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 09:01:24 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}]}) 09:01:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, 0x0, 0x0) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 09:01:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 09:01:24 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}]}) 09:01:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 09:01:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 09:01:25 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x0, 0x0}]}) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000280)='f', &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000740)="f6", 0x1, 0x4847, 0x0, 0x0) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, 0x0, 0x0, 0x4847, 0x0, 0x0) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, 0x0, 0x0, 0x4847, 0x0, 0x0) 09:01:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:25 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x0, 0x0}]}) 09:01:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280), &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, 0x0, 0x0, 0x4847, 0x0, 0x0) 09:01:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:25 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280), &(0x7f0000000040)=@tcp}, 0x20) 09:01:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, 0x0, 0x0) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740), 0x0, 0x4847, 0x0, 0x0) 09:01:26 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280), &(0x7f0000000040)=@tcp}, 0x20) 09:01:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chdir(&(0x7f0000000300)='./file0\x00') r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[], 0x8) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:01:26 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x0, 0x0}]}) 09:01:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) unlink(&(0x7f0000000280)='./bus\x00') 09:01:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', 0x0}, 0x20) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740), 0x0, 0x4847, 0x0, 0x0) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)=""/146, &(0x7f0000000080)=0x92) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x8, @private2}}, 0x5c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:01:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740), 0x0, 0x4847, 0x0, 0x0) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:26 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', 0x0}, 0x20) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x0, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4}}]}) 09:01:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2ae02fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 09:01:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x0, 0x0, 0x0) 09:01:26 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) fsopen(&(0x7f0000000340)='ocfs2\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000000)=@udp6}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)='f', &(0x7f0000000040)=@tcp}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f0000000280)='f', 0x0}, 0x20) 09:01:26 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x0, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="6302000000000000cc001a8018000a8014000700fe8000000000000000000000000000aa300002802c0001800c0016"], 0xec}}, 0x0) 09:01:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 09:01:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x0, 0x0, 0x0) 09:01:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x0, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:27 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4}}]}) 09:01:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020004030, &(0x7f0000000040)={0x2, 0x2, @empty}, 0x10) sendto(r0, &(0x7f0000000740)="f6", 0x1, 0x0, 0x0, 0x0) 09:01:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 09:01:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x0, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "80000002c76060e500"}) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x2000000a, 0x0, 0x0, 0x0, 0x0, "000000000000000000090010000000001000"}) 09:01:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) [ 606.985370][ T29] audit: type=1804 audit(1596704487.512:22): pid=25122 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/690/file0" dev="sda1" ino=16292 res=1 09:01:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r0, 0x4) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000380)=ANY=[@ANYBLOB="05002f51b0f754d0b67ac283cf17000000000000050b00000000000001000000000000008300004038bed7000000000800000000000000b60a0000000000000600000000000000bc09000000000000ff03000000000000ab"]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3e) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r3, &(0x7f0000000280)='P', 0x1, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000003000)={'bond0\x00', 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40030}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_TOS={0x5}, @IFLA_GRE_TOS={0x5, 0x9, 0x7f}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_ENCAP_FLAGS={0x6}, @IFLA_GRE_IFLAGS={0x6, 0x2, 0x38}]}}}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_BROADCAST={0xa}]}, 0x6c}}, 0x0) 09:01:27 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) pipe2$9p(0x0, 0x0) dup(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 607.301412][ T29] audit: type=1804 audit(1596704487.832:23): pid=25141 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16357 res=1 [ 607.330747][T25143] bond0: (slave gre1): ether type (778) is different from other slaves (1), can not enslave it 09:01:28 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x41, &(0x7f00000004c0)=@string={0x41, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4b9509354db62b7"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4}}]}) 09:01:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) fcntl$dupfd(r2, 0x0, r3) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) [ 607.441293][T25143] bond0: (slave gre1): ether type (778) is different from other slaves (1), can not enslave it 09:01:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) pipe2$9p(0x0, 0x0) dup(0xffffffffffffffff) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0xffffffffffffffff, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r0, 0x4) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000380)=ANY=[@ANYBLOB="05002f51b0f754d0b67ac283cf17000000000000050b00000000000001000000000000008300004038bed7000000000800000000000000b60a0000000000000600000000000000bc09000000000000ff03000000000000ab"]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3e) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r3, 0x29, 0x7, &(0x7f0000000000), 0x244) sendto$inet6(r3, &(0x7f0000000280)='P', 0x1, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000003000)={'bond0\x00', 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40030}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_TOS={0x5}, @IFLA_GRE_TOS={0x5, 0x9, 0x7f}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_ENCAP_FLAGS={0x6}, @IFLA_GRE_IFLAGS={0x6, 0x2, 0x38}]}}}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_BROADCAST={0xa}]}, 0x6c}}, 0x0) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0xffffffffffffffff, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) [ 607.571845][ T29] audit: type=1804 audit(1596704488.102:24): pid=25167 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16357 res=1 [ 607.638836][T25174] bond0: (slave gre1): ether type (778) is different from other slaves (1), can not enslave it 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0xffffffffffffffff, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "80000002c76060e500"}) write$binfmt_aout(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="7bcb9edbcc9d1dd33846e70f2444fc768f92a8f07763fb63fc6fa9b081ddd072bc035b568311aa58e58b081556c31beeeff913acf3793d93854610838efb2f636d66a8e9d692f04f65c4d6e455dcdd9194ea2c5605483290597bcf0cbe8d7b46e8707c6e8cc62d63b67fab5472a51e968ee6e4f3e5c4ffb4"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x20000025, 0x0, 0x0, 0x0, 0x0, "000000000000000000090010000000001000"}) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="6302000000000000cc001a8018000a8014000700fe8000000000000000000000000000aa300002802c0001800c00160000000000200e0000000000001b000000000000000800000000"], 0xec}}, 0x0) 09:01:28 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:28 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "d40bb2aa247cbf4b53ceef6822ac73cf56e21828db038afc1dae7fd976d550677957f521a1efb2cc23d01fa92efb587cc43709e18f0582c21acc523d0ec3a172"}, 0xb8) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000180)={0xf8, 0x0, 0x2, [{0x1000000000000007, 0x0, 0x6, 0x0, '\'Qem\x14{'}, {0x0, 0x0, 0xac, 0x0, '/\xc4\x9a\xa1\xcd\x00\xb2\x82\xe9\xd1\xe9\xffm\xb8\'\x15d\xb6_J\xbd{\xe9:\xf3\x8a\xfaj6\xcd\xf2\x182O\x12:\fF\x86>\xd5x\a\'\xb7\xdc3H/\xa1\xd8O\xab\xc2%\xaa\xc8<\xcar\x00\x01\x9c\xa2\xe9h\xbeM\xef\xca\xc9vI\xdd\xae\'\xbb\x85\x0f\xda\xeb\xbb1\x89\xd62W\x02T\xc4\xad7\xdcJ1\xd3\xc7\xa3>O\xa7`\x04\xd7\xde\xe3\xc9nUw\xca\x9c\xfbo\xfa\"\x8eL\x91\x90s=\xf1\x1d\xbb\x1e\xd9\a\xdc\x80\xdc\xa1&\x1au\xfa\xe1\x87\xe0nh?\xae\x01*H\xf3\x91\xbb\x84-\xf6\b\xadr!\xd3J\xb4%\x194\xf0(Ca\x11_\x9eY\xb5I'}]}, 0xf8) 09:01:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="ec0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="6302000000000000cc001a8018000a8014000700fe8000000000000000000000000000aa300002802c0001800c00160000000000200e0000000000001b000000000000000800000000"], 0xec}}, 0x0) 09:01:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:28 executing program 3: exit(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) setreuid(0x0, r1) capset(&(0x7f0000000000)={0x20080522}, &(0x7f00000000c0)) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/65, 0x7ffff000}], 0x1) 09:01:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x93, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 09:01:28 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x6558, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:01:28 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x43}}) 09:01:28 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x6558, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 608.199492][ T29] audit: type=1804 audit(1596704488.732:25): pid=25213 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/693/file0" dev="sda1" ino=16285 res=1 09:01:28 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x6558, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:01:29 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) 09:01:29 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x6558, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 608.624766][T25237] __report_access: 3 callbacks suppressed [ 608.624844][T25237] ptrace attach of "/root/syz-executor.1"[25236] was attempted by "/root/syz-executor.1"[25237] 09:01:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:29 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000)="334c79e4ff53", &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000100)={r0, 0x0, 0x746000}, 0x20) 09:01:29 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:01:29 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 09:01:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) 09:01:29 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 09:01:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) [ 609.080985][T25251] ptrace attach of "/root/syz-executor.1"[25249] was attempted by "/root/syz-executor.1"[25251] 09:01:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0xfffffffc, 0x3c}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 09:01:29 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x28, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}}, 0x0) 09:01:29 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x3, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:29 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 609.193028][T25263] ptrace attach of "/root/syz-executor.1"[25260] was attempted by "/root/syz-executor.1"[25263] 09:01:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) 09:01:29 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:01:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:29 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:01:29 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) 09:01:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) socket$nl_netfilter(0x10, 0x3, 0xc) gettid() r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x14e24, 0x80000000}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000000606050000000000000000000a00000a09000300737976000000000005000100070000080900020000000000000000000900030073797a32000000000900030073797afb530000000900000473797a31000000000900020073797a310009000200"/112], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES64], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r5, r4, 0x0, 0x100004100) [ 609.356089][T25279] ptrace attach of "/root/syz-executor.1"[25278] was attempted by "/root/syz-executor.1"[25279] 09:01:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', 0x0}) [ 609.436552][T25289] ptrace attach of "/root/syz-executor.1"[25288] was attempted by "/root/syz-executor.1"[25289] [ 609.535306][T25299] ptrace attach of "/root/syz-executor.1"[25298] was attempted by "/root/syz-executor.1"[25299] 09:01:30 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x0, 0x0}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:30 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @broadcast}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 09:01:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) [ 609.714432][ T29] audit: type=1804 audit(1596704490.242:26): pid=25293 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/696/cgroup.controllers" dev="sda1" ino=16278 res=1 09:01:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) 09:01:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010300100000004000e401"], 0x34}}, 0x0) 09:01:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) [ 610.117004][T25322] ptrace attach of "/root/syz-executor.1"[25321] was attempted by "/root/syz-executor.1"[25322] [ 610.266772][ T29] audit: type=1804 audit(1596704490.782:27): pid=25297 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/696/cgroup.controllers" dev="sda1" ino=16278 res=1 09:01:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) socket$nl_netfilter(0x10, 0x3, 0xc) gettid() r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x14e24, 0x80000000}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe0, 0x0) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000000606050000000000000000000a00000a09000300737976000000000005000100070000080900020000000000000000000900030073797a32000000000900030073797afb530000000900000473797a31000000000900020073797a310009000200"/112], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES64], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r5, r4, 0x0, 0x100004100) 09:01:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)={0x14, r1, 0xdaa3b002485c5b6d, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) r2 = socket(0x0, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0), 0x0, 0x0, 0x0) 09:01:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x2001, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) ptrace(0x10, r0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_macvtap\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) 09:01:30 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x0, 0x0}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x54, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_NAT_SRC={0x4}, @CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x54}}, 0x0) [ 610.391906][T25332] ptrace attach of "/root/syz-executor.1"[25329] was attempted by "/root/syz-executor.1"[25332] 09:01:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209211", 0x14, 0x6, 0x0, @dev, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 09:01:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:31 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 0: socket$kcm(0x2, 0x3, 0x2) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000007c0)={'wg1\x00', @link_local}) 09:01:31 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) [ 610.722729][ T29] audit: type=1804 audit(1596704491.252:28): pid=25341 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/697/cgroup.controllers" dev="sda1" ino=16273 res=1 09:01:31 executing program 4: 09:01:31 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:31 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x0, 0x0}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004060102e60001007a58008000fff8000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000000) 09:01:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) [ 611.400604][ T29] audit: type=1804 audit(1596704491.932:29): pid=25381 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir002525711/syzkaller.E79eFk/699/cgroup.controllers" dev="sda1" ino=16355 res=1 [ 611.436060][T25376] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 09:01:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x2, &(0x7f00000004c0)=@string={0x2}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x28, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}}, 0x0) 09:01:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x30, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x30}}, 0x0) 09:01:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)='.', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000080)=0x8) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 09:01:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:32 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x2, &(0x7f00000004c0)=@string={0x2}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 09:01:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:32 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:32 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:32 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:33 executing program 4: 09:01:33 executing program 4: 09:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:01:33 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x2, &(0x7f00000004c0)=@string={0x2}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:33 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:33 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:33 executing program 4: 09:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 09:01:33 executing program 4: 09:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 09:01:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:33 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:33 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x22, &(0x7f00000004c0)=@string={0x22, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:33 executing program 4: 09:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 09:01:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) 09:01:33 executing program 4: 09:01:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:34 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x22, &(0x7f00000004c0)=@string={0x22, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:34 executing program 4: 09:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) 09:01:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:34 executing program 4: 09:01:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) 09:01:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:34 executing program 4: 09:01:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:35 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x22, &(0x7f00000004c0)=@string={0x22, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:35 executing program 4: 09:01:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:35 executing program 4: 09:01:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:35 executing program 4: 09:01:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:35 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x32, &(0x7f00000004c0)=@string={0x32, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477c"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 4: 09:01:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab", 0x1) 09:01:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:35 executing program 4: 09:01:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xe8, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[], 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) 09:01:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, 0x0, 0x0) 09:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) 09:01:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x5, &(0x7f0000000080)="ab553fec94248c32", 0x8) 09:01:36 executing program 4: 09:01:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:36 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x32, &(0x7f00000004c0)=@string={0x32, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477c"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, 0x0, 0x0) 09:01:36 executing program 4: 09:01:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, 0x0, 0x0) 09:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) 09:01:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:36 executing program 4: 09:01:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:36 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x32, &(0x7f00000004c0)=@string={0x32, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477c"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) 09:01:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x17b}, 0x0) 09:01:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 09:01:36 executing program 4: 09:01:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) 09:01:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x17b}, 0x0) 09:01:37 executing program 4: 09:01:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:37 executing program 4: 09:01:37 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x1b6, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1a4, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@mdlm_detail={0x3f, 0x24, 0x13, 0x4, "0c9f9a9320b2469b85403da9fc721b2ca79f3e50ba6808071f4051536e0c6133676ad9544380f1bc7433e48136a6c2910e8fafda7a2c917f620d5d"}, @country_functional={0xc, 0x24, 0x7, 0x1, 0x56e1, [0x81, 0x1, 0x0]}, @obex={0x5, 0x24, 0x15, 0x40}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0x3c, 0x5}, @mbim={0xc, 0x24, 0x1b, 0xfff, 0x9, 0x3, 0x2, 0x732, 0x1f}, @mdlm_detail={0xe4, 0x24, 0x13, 0x80, "27d652b2670ac2596e6ce2e9e1bec319196ac8cd130904b3f5a38da5e194231b28aced2cc79fd600810507bb1cf75d81451f343f84d5304d350c93e8ab478bc3078a4330f9f204b6ed0e9ea36a46e76214c7d0d299f66431ff7b6306984c56881fe0f6b781ceb7dbf438903cc6bad525a4d0317abc6fbd4e72c992ac3f8284b656ef4508aac31c70d700af13bc3ccac12cfb02cd515290a41eabc27502bf0d39055aea3da1730c2f32bdc8f835be82e5c3bf155ea481f12dd9a3edceb477625c1772b9aac5efd55d7075b9a49fabcc80a51d465e1b71b40deb1a1779ef3a1d40"}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x5, 0x73}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x9, 0x40, 0x9}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x34, 0x31, 0x3b}}}}}}}]}}, &(0x7f0000000580)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x201, 0x4, 0x20, 0x6, 0x40, 0x2}, 0x5, &(0x7f0000000280)={0x5, 0xf, 0x5}, 0x4, [{0xce, &(0x7f00000002c0)=@string={0xce, 0x3, "7e38c75b862c063974215447d10bba61d726a26b564b298ce5c1f33cf780fa19b816daa29fbc5aa7a54afeb4104dd3d1fe75dd913010e7b0ef3de259c8dff4059f0f022e71998b224ab7178b6ccbcc7114e7d705c1398a0ba20c36d219f38cee7c3559fe2f69758e90c86cc3a01450fda399c06f2cc5f297759cc13022ada7ca0cd1f88c53c04fd81fe63f5d976babae51247919df74887e3cdddc2cd7db3443869b9a728b76f176fab82af8d59d3cf37cd62f7bdc3de53628febd8a19c6a8d267f490a49f0db7063a6462b5"}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "55aa3f8336c2e207a5499efae979377d5fe5bf65b12353ff6877b64197ccec8ab4c8c57f184e86a22cd48e561c5d08bac530b0fd968a76ca39051f03574aab45e901956e9030b92e18aff928662ed68a8414cf33f621290eebc8ae58eede7c5ed84a192675eca7dcb2dee65f57d996d989b80e8a23159d9efedc85c30fc6561a67e0d5c768febc21c61a1d24b9225590f4dd8f868ff06500da9d7399d3c8b2934d67d3bb9f26c4005a5a19022399065392dfc819efe2636e764bd4ec5e7769f708d3c6dda550f4f7cba8b55f5778e5b4ab0fb7bb5281b8b1f9a5d5"}}, {0x3a, &(0x7f00000004c0)=@string={0x3a, 0x3, "45b0f9170d681e509ea6f8ac4dff980aee90d940cc1343a79db76229c4932978853aefc010c2c4f1547cdba4ede1477cbc8d5c36f4e3efe4"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x807}}]}) 09:01:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x17b}, 0x0) 09:01:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) 09:01:37 executing program 4: 09:01:37 executing program 0: 09:01:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000080), 0x0) 09:01:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x20002154}, 0x1, 0x17b}, 0x0) 09:01:37 executing program 0: 09:01:37 executing program 4: 09:01:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) 09:01:37 executing program 4: [ 617.497363][ T9957] ================================================================== [ 617.508439][ T9957] BUG: KCSAN: data-race in _extract_crng / crng_reseed [ 617.517604][ T9957] [ 617.520337][ T9957] write to 0xffffffff89c455d8 of 8 bytes by task 10306 on cpu 1: [ 617.532704][ T9957] crng_reseed+0x3ed/0x680 [ 617.537863][ T9957] _extract_crng+0xcc/0x2d0 [ 617.544155][ T9957] crng_reseed+0x69/0x680 [ 617.549554][ T9957] _extract_crng+0xcc/0x2d0 [ 617.556920][ T9957] _get_random_bytes+0x141/0x260 [ 617.564130][ T9957] get_random_bytes+0x65/0x110 [ 617.569511][ T9957] nsim_dev_trap_report_work+0x200/0x5c0 [ 617.578113][ T9957] process_one_work+0x3e1/0x9a0 [ 617.583563][ T9957] worker_thread+0x665/0xbe0 [ 617.589175][ T9957] kthread+0x20d/0x230 [ 617.594885][ T9957] ret_from_fork+0x1f/0x30 [ 617.601972][ T9957] [ 617.604838][ T9957] read to 0xffffffff89c455d8 of 8 bytes by task 9957 on cpu 0: [ 617.615167][ T9957] _extract_crng+0x47/0x2d0 [ 617.622226][ T9957] crng_reseed+0x69/0x680 [ 617.630104][ T9957] _extract_crng+0xcc/0x2d0 [ 617.634868][ T9957] _get_random_bytes+0x141/0x260 [ 617.640073][ T9957] get_random_bytes+0x65/0x110 [ 617.645919][ T9957] nsim_dev_trap_report_work+0x200/0x5c0 [ 617.652513][ T9957] process_one_work+0x3e1/0x9a0 [ 617.657988][ T9957] worker_thread+0x665/0xbe0 [ 617.664793][ T9957] kthread+0x20d/0x230 [ 617.671198][ T9957] ret_from_fork+0x1f/0x30 [ 617.678199][ T9957] [ 617.683657][ T9957] Reported by Kernel Concurrency Sanitizer on: [ 617.691648][ T9957] CPU: 0 PID: 9957 Comm: kworker/0:4 Not tainted 5.8.0-syzkaller #0 [ 617.700522][ T9957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.711041][ T9957] Workqueue: events nsim_dev_trap_report_work [ 617.717472][ T9957] ================================================================== [ 617.726712][ T9957] Kernel panic - not syncing: panic_on_warn set ... [ 617.733727][ T9957] CPU: 0 PID: 9957 Comm: kworker/0:4 Not tainted 5.8.0-syzkaller #0 [ 617.743201][ T9957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.755542][ T9957] Workqueue: events nsim_dev_trap_report_work [ 617.762337][ T9957] Call Trace: [ 617.766051][ T9957] dump_stack+0x10f/0x19d [ 617.770635][ T9957] panic+0x207/0x64a [ 617.774945][ T9957] ? vprintk_emit+0x44a/0x4f0 [ 617.780066][ T9957] kcsan_report+0x684/0x690 [ 617.785812][ T9957] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 617.791920][ T9957] ? _extract_crng+0x47/0x2d0 [ 617.796681][ T9957] ? crng_reseed+0x69/0x680 [ 617.801177][ T9957] ? _extract_crng+0xcc/0x2d0 [ 617.806121][ T9957] ? _get_random_bytes+0x141/0x260 [ 617.811510][ T9957] ? get_random_bytes+0x65/0x110 [ 617.816626][ T9957] ? nsim_dev_trap_report_work+0x200/0x5c0 [ 617.823144][ T9957] ? process_one_work+0x3e1/0x9a0 [ 617.828709][ T9957] ? worker_thread+0x665/0xbe0 [ 617.833992][ T9957] ? kthread+0x20d/0x230 [ 617.838922][ T9957] ? ret_from_fork+0x1f/0x30 [ 617.844722][ T9957] kcsan_setup_watchpoint+0x41e/0x4a0 [ 617.850670][ T9957] _extract_crng+0x47/0x2d0 [ 617.856185][ T9957] crng_reseed+0x69/0x680 [ 617.861020][ T9957] ? calc_wheel_index+0x3e/0x280 [ 617.866538][ T9957] _extract_crng+0xcc/0x2d0 [ 617.871822][ T9957] _get_random_bytes+0x141/0x260 [ 617.877212][ T9957] ? nsim_dev_trap_report_work+0x191/0x5c0 [ 617.883694][ T9957] ? __kmalloc_node_track_caller+0x30/0x40 [ 617.890029][ T9957] ? nsim_dev_trap_report_work+0x200/0x5c0 [ 617.896921][ T9957] get_random_bytes+0x65/0x110 [ 617.902115][ T9957] nsim_dev_trap_report_work+0x200/0x5c0 [ 617.908272][ T9957] process_one_work+0x3e1/0x9a0 [ 617.913584][ T9957] worker_thread+0x665/0xbe0 [ 617.918174][ T9957] ? finish_task_switch+0x8b/0x270 [ 617.923283][ T9957] ? process_one_work+0x9a0/0x9a0 [ 617.928774][ T9957] kthread+0x20d/0x230 [ 617.933435][ T9957] ? process_one_work+0x9a0/0x9a0 [ 617.939158][ T9957] ? kthread_blkcg+0x80/0x80 [ 617.944177][ T9957] ret_from_fork+0x1f/0x30 [ 617.953257][ T9957] Kernel Offset: disabled [ 617.958177][ T9957] Rebooting in 86400 seconds..