0000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r0}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1068.949525][ T6264] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1068.957511][ T6264] RDX: 0000000020000100 RSI: 000000008008af26 RDI: 0000000000000003 [ 1068.965493][ T6264] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1068.973476][ T6264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1068.981460][ T6264] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fd726ad26d4 [ 1069.011140][ T6263] new mount options do not match the existing superblock, will be ignored [ 1069.030943][ T6284] FAULT_INJECTION: forcing a failure. [ 1069.030943][ T6284] name failslab, interval 1, probability 0, space 0, times 0 13:47:13 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x80000002}], 0x1) [ 1069.114748][ T6284] CPU: 0 PID: 6284 Comm: syz-executor.4 Not tainted 5.8.0-rc5-syzkaller #0 [ 1069.123369][ T6284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.133547][ T6284] Call Trace: [ 1069.136857][ T6284] dump_stack+0x18f/0x20d [ 1069.141208][ T6284] should_fail.cold+0x5/0x14 [ 1069.145821][ T6284] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1069.151686][ T6284] should_failslab+0x5/0xf [ 1069.156116][ T6284] __kmalloc+0x27d/0x340 [ 1069.160374][ T6284] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 1069.165942][ T6284] tomoyo_realpath_from_path+0xc3/0x620 [ 1069.171502][ T6284] ? tomoyo_profile+0x42/0x50 [ 1069.176201][ T6284] tomoyo_path_number_perm+0x1cb/0x4d0 [ 1069.181682][ T6284] ? tomoyo_path_number_perm+0x183/0x4d0 [ 1069.187329][ T6284] ? tomoyo_execute_permission+0x470/0x470 [ 1069.193159][ T6284] ? lock_is_held_type+0xb0/0xe0 [ 1069.198126][ T6284] ? selinux_inode_getsecctx+0x90/0x90 [ 1069.203604][ T6284] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1069.209162][ T6284] ? lock_is_held_type+0xb0/0xe0 [ 1069.214131][ T6284] ? __fget_files+0x294/0x400 [ 1069.218889][ T6284] security_file_ioctl+0x50/0xb0 [ 1069.223843][ T6284] ksys_ioctl+0x50/0x180 [ 1069.228108][ T6284] __x64_sys_ioctl+0x6f/0xb0 [ 1069.232798][ T6284] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1069.237927][ T6284] do_syscall_64+0x60/0xe0 [ 1069.242363][ T6284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1069.248264][ T6284] RIP: 0033:0x45cba9 [ 1069.252158][ T6284] Code: Bad RIP value. [ 1069.256230][ T6284] RSP: 002b:00007fde689f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.264722][ T6284] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1069.269644][ T6292] new mount options do not match the existing superblock, will be ignored [ 1069.272702][ T6284] RDX: 0000000020000100 RSI: 000000004008af00 RDI: 0000000000000003 [ 1069.272711][ T6284] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1069.272719][ T6284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1069.272728][ T6284] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fde689fa6d4 [ 1069.301533][ T6284] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1069.322935][ T6264] ERROR: Out of memory at tomoyo_realpath_from_path. 13:47:14 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) [ 1069.518230][ T6297] new mount options do not match the existing superblock, will be ignored [ 1069.575521][ T6302] FAULT_INJECTION: forcing a failure. [ 1069.575521][ T6302] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1069.588756][ T6302] CPU: 1 PID: 6302 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 1069.590192][ T6297] new mount options do not match the existing superblock, will be ignored [ 1069.597344][ T6302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.597351][ T6302] Call Trace: [ 1069.597373][ T6302] dump_stack+0x18f/0x20d [ 1069.597393][ T6302] should_fail.cold+0x5/0x14 [ 1069.597421][ T6302] __alloc_pages_nodemask+0x1a3/0x930 [ 1069.634538][ T6302] ? __alloc_pages_slowpath.constprop.0+0x2780/0x2780 [ 1069.641327][ T6302] ? lock_downgrade+0x820/0x820 [ 1069.646203][ T6302] cache_grow_begin+0x8c/0xb20 [ 1069.650992][ T6302] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1069.656646][ T6302] cache_alloc_refill+0x27b/0x340 [ 1069.661845][ T6302] ? lockdep_hardirqs_off+0x66/0xa0 [ 1069.667157][ T6302] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1069.673001][ T6302] __kmalloc+0x319/0x340 [ 1069.677260][ T6302] tomoyo_realpath_from_path+0xc3/0x620 [ 1069.682837][ T6302] ? tomoyo_profile+0x42/0x50 [ 1069.687533][ T6302] tomoyo_path_number_perm+0x1cb/0x4d0 [ 1069.693006][ T6302] ? tomoyo_path_number_perm+0x183/0x4d0 [ 1069.698655][ T6302] ? tomoyo_execute_permission+0x470/0x470 [ 1069.704477][ T6302] ? lock_is_held_type+0xb0/0xe0 [ 1069.709443][ T6302] ? selinux_inode_getsecctx+0x90/0x90 [ 1069.715047][ T6302] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1069.720622][ T6302] ? lock_is_held_type+0xb0/0xe0 [ 1069.725686][ T6302] ? __fget_files+0x294/0x400 [ 1069.730383][ T6302] security_file_ioctl+0x50/0xb0 [ 1069.735337][ T6302] ksys_ioctl+0x50/0x180 [ 1069.743853][ T6302] __x64_sys_ioctl+0x6f/0xb0 [ 1069.748457][ T6302] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1069.753587][ T6302] do_syscall_64+0x60/0xe0 [ 1069.758023][ T6302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1069.763938][ T6302] RIP: 0033:0x45cba9 [ 1069.767834][ T6302] Code: Bad RIP value. [ 1069.771909][ T6302] RSP: 002b:00007fd726ad1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.780347][ T6302] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1069.788327][ T6302] RDX: 0000000020000100 RSI: 000000008008af26 RDI: 0000000000000003 [ 1069.796310][ T6302] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1069.804294][ T6302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1069.812363][ T6302] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fd726ad26d4 13:47:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:16 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2, 0x0, 0x3f00}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:16 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:47:16 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0xffffff1f}], 0x1) 13:47:16 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r0}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:16 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1071.769935][ T6315] FAULT_INJECTION: forcing a failure. [ 1071.769935][ T6315] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.784301][ T6316] FAULT_INJECTION: forcing a failure. [ 1071.784301][ T6316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1071.797519][ T6316] CPU: 0 PID: 6316 Comm: syz-executor.4 Not tainted 5.8.0-rc5-syzkaller #0 [ 1071.806113][ T6316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.816177][ T6316] Call Trace: 13:47:16 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2, 0x0, 0xb400}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1071.819490][ T6316] dump_stack+0x18f/0x20d [ 1071.823842][ T6316] should_fail.cold+0x5/0x14 [ 1071.828458][ T6316] __alloc_pages_nodemask+0x1a3/0x930 [ 1071.833855][ T6316] ? __alloc_pages_slowpath.constprop.0+0x2780/0x2780 [ 1071.840638][ T6316] ? lock_downgrade+0x820/0x820 [ 1071.845515][ T6316] cache_grow_begin+0x8c/0xb20 [ 1071.850299][ T6316] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 1071.852731][ T6323] new mount options do not match the existing superblock, will be ignored [ 1071.855769][ T6316] cache_alloc_refill+0x27b/0x340 [ 1071.855787][ T6316] ? lockdep_hardirqs_off+0x66/0xa0 [ 1071.855809][ T6316] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1071.855828][ T6316] __kmalloc+0x319/0x340 [ 1071.884596][ T6316] tomoyo_realpath_from_path+0xc3/0x620 [ 1071.890160][ T6316] ? tomoyo_profile+0x42/0x50 [ 1071.894858][ T6316] tomoyo_path_number_perm+0x1cb/0x4d0 [ 1071.899347][ T6325] new mount options do not match the existing superblock, will be ignored [ 1071.900326][ T6316] ? tomoyo_path_number_perm+0x183/0x4d0 [ 1071.900347][ T6316] ? tomoyo_execute_permission+0x470/0x470 [ 1071.900375][ T6316] ? lock_is_held_type+0xb0/0xe0 [ 1071.925460][ T6316] ? selinux_inode_getsecctx+0x90/0x90 [ 1071.931002][ T6316] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1071.936560][ T6316] ? lock_is_held_type+0xb0/0xe0 [ 1071.941519][ T6316] ? __fget_files+0x294/0x400 [ 1071.946214][ T6316] security_file_ioctl+0x50/0xb0 [ 1071.951168][ T6316] ksys_ioctl+0x50/0x180 [ 1071.955433][ T6316] __x64_sys_ioctl+0x6f/0xb0 [ 1071.960035][ T6316] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1071.965274][ T6316] do_syscall_64+0x60/0xe0 [ 1071.969706][ T6316] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1071.975607][ T6316] RIP: 0033:0x45cba9 [ 1071.979507][ T6316] Code: Bad RIP value. [ 1071.983579][ T6316] RSP: 002b:00007fde689f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.991997][ T6316] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1071.999971][ T6316] RDX: 0000000020000100 RSI: 000000004008af00 RDI: 0000000000000003 [ 1072.007949][ T6316] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1072.015926][ T6316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1072.023909][ T6316] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fde689fa6d4 [ 1072.054154][ T6315] CPU: 1 PID: 6315 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 1072.062771][ T6315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.070707][ T6318] new mount options do not match the existing superblock, will be ignored [ 1072.072826][ T6315] Call Trace: [ 1072.072847][ T6315] dump_stack+0x18f/0x20d [ 1072.072869][ T6315] should_fail.cold+0x5/0x14 [ 1072.093554][ T6315] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 1072.098941][ T6315] should_failslab+0x5/0xf [ 1072.103370][ T6315] __kmalloc+0x27d/0x340 [ 1072.107624][ T6315] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1072.113364][ T6315] tomoyo_encode2.part.0+0xe9/0x3a0 [ 1072.118577][ T6315] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1072.124310][ T6315] tomoyo_encode+0x28/0x50 [ 1072.128741][ T6315] tomoyo_realpath_from_path+0x186/0x620 [ 1072.134394][ T6315] tomoyo_path_number_perm+0x1cb/0x4d0 [ 1072.139861][ T6315] ? tomoyo_path_number_perm+0x183/0x4d0 [ 1072.145499][ T6315] ? tomoyo_execute_permission+0x470/0x470 [ 1072.151311][ T6315] ? lock_is_held_type+0xb0/0xe0 [ 1072.156293][ T6315] ? selinux_inode_getsecctx+0x90/0x90 [ 1072.161750][ T6315] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1072.167505][ T6315] ? lock_is_held_type+0xb0/0xe0 [ 1072.172450][ T6315] ? __fget_files+0x294/0x400 [ 1072.177145][ T6315] security_file_ioctl+0x50/0xb0 [ 1072.182079][ T6315] ksys_ioctl+0x50/0x180 [ 1072.186324][ T6315] __x64_sys_ioctl+0x6f/0xb0 [ 1072.190925][ T6315] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1072.196040][ T6315] do_syscall_64+0x60/0xe0 [ 1072.200445][ T6315] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1072.206434][ T6315] RIP: 0033:0x45cba9 [ 1072.210317][ T6315] Code: Bad RIP value. 13:47:17 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x8) [ 1072.214383][ T6315] RSP: 002b:00007fd726ad1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1072.222802][ T6315] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1072.230772][ T6315] RDX: 0000000020000100 RSI: 000000008008af26 RDI: 0000000000000003 [ 1072.238814][ T6315] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1072.246792][ T6315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1072.254823][ T6315] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fd726ad26d4 13:47:17 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:47:17 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1072.326722][ T6315] ERROR: Out of memory at tomoyo_realpath_from_path. 13:47:17 executing program 5 (fault-call:1 fault-nth:3): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) [ 1072.397876][ T6337] new mount options do not match the existing superblock, will be ignored [ 1072.440388][ T6341] FAULT_INJECTION: forcing a failure. [ 1072.440388][ T6341] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.506488][ T6341] CPU: 0 PID: 6341 Comm: syz-executor.4 Not tainted 5.8.0-rc5-syzkaller #0 [ 1072.515116][ T6341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.525184][ T6341] Call Trace: [ 1072.528496][ T6341] dump_stack+0x18f/0x20d [ 1072.532849][ T6341] should_fail.cold+0x5/0x14 [ 1072.537459][ T6341] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 1072.542849][ T6341] should_failslab+0x5/0xf [ 1072.547285][ T6341] __kmalloc+0x27d/0x340 [ 1072.551633][ T6341] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1072.557372][ T6341] tomoyo_encode2.part.0+0xe9/0x3a0 [ 1072.562584][ T6341] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1072.568322][ T6341] tomoyo_encode+0x28/0x50 [ 1072.572756][ T6341] tomoyo_realpath_from_path+0x186/0x620 [ 1072.578412][ T6341] tomoyo_path_number_perm+0x1cb/0x4d0 [ 1072.583887][ T6341] ? tomoyo_path_number_perm+0x183/0x4d0 [ 1072.589540][ T6341] ? tomoyo_execute_permission+0x470/0x470 [ 1072.595380][ T6341] ? lock_is_held_type+0xb0/0xe0 [ 1072.600350][ T6341] ? selinux_inode_getsecctx+0x90/0x90 [ 1072.605827][ T6341] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1072.611386][ T6341] ? lock_is_held_type+0xb0/0xe0 [ 1072.616344][ T6341] ? __fget_files+0x294/0x400 [ 1072.621045][ T6341] security_file_ioctl+0x50/0xb0 [ 1072.626001][ T6341] ksys_ioctl+0x50/0x180 [ 1072.630347][ T6341] __x64_sys_ioctl+0x6f/0xb0 [ 1072.634945][ T6341] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1072.640068][ T6341] do_syscall_64+0x60/0xe0 [ 1072.644499][ T6341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1072.650399][ T6341] RIP: 0033:0x45cba9 [ 1072.654294][ T6341] Code: Bad RIP value. [ 1072.658364][ T6341] RSP: 002b:00007fde689f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1072.666783][ T6341] RAX: ffffffffffffffda RBX: 00000000004f1f00 RCX: 000000000045cba9 [ 1072.674760][ T6341] RDX: 0000000020000100 RSI: 000000004008af00 RDI: 0000000000000003 [ 1072.682826][ T6341] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1072.690806][ T6341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1072.698782][ T6341] R13: 0000000000000608 R14: 00000000004c8f4f R15: 00007fde689fa6d4 13:47:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:47:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1072.761862][ T6337] new mount options do not match the existing superblock, will be ignored [ 1072.793344][ T6354] new mount options do not match the existing superblock, will be ignored [ 1072.797754][ T6341] ERROR: Out of memory at tomoyo_realpath_from_path. 13:47:19 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:19 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x600) 13:47:19 executing program 4 (fault-call:1 fault-nth:3): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:47:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x2, &(0x7f0000000100)) 13:47:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0x3}], 0x2, 0x0, 0x0, 0x0) 13:47:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0x8}], 0x2, 0x0, 0x0, 0x0) 13:47:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1075.215229][ T6374] new mount options do not match the existing superblock, will be ignored [ 1075.234420][ T6372] new mount options do not match the existing superblock, will be ignored 13:47:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x10, &(0x7f0000000100)) 13:47:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0xb4}], 0x2, 0x0, 0x0, 0x0) [ 1075.339096][ T6372] new mount options do not match the existing superblock, will be ignored 13:47:20 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:20 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x20000281) 13:47:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0x300}], 0x2, 0x0, 0x0, 0x0) [ 1075.598548][ T6400] new mount options do not match the existing superblock, will be ignored [ 1075.744960][ T6406] new mount options do not match the existing superblock, will be ignored [ 1075.822300][ T6406] new mount options do not match the existing superblock, will be ignored 13:47:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4b47, &(0x7f0000000100)) 13:47:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x2, &(0x7f0000000100)=0x4000000) 13:47:22 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0x3f00}], 0x2, 0x0, 0x0, 0x0) 13:47:22 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:22 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x7ffff000) 13:47:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d, 0xb400}], 0x2, 0x0, 0x0, 0x0) [ 1078.248040][ T6424] new mount options do not match the existing superblock, will be ignored [ 1078.266533][ T6428] new mount options do not match the existing superblock, will be ignored 13:47:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4b49, &(0x7f0000000100)) 13:47:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x10, &(0x7f0000000100)=0x4000000) [ 1078.344070][ T6424] new mount options do not match the existing superblock, will be ignored 13:47:23 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x80000002) 13:47:23 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x3) [ 1078.669557][ T6454] new mount options do not match the existing superblock, will be ignored [ 1078.758327][ T6449] new mount options do not match the existing superblock, will be ignored 13:47:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4c01, &(0x7f0000000100)) 13:47:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x2202, &(0x7f0000000100)=0x4000000) 13:47:25 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:25 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x8) 13:47:25 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0xffffff1f) 13:47:26 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xb4) 13:47:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4b47, &(0x7f0000000100)=0x4000000) 13:47:26 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1081.328239][ T6470] new mount options do not match the existing superblock, will be ignored 13:47:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x541b, &(0x7f0000000100)) [ 1081.445342][ T6470] new mount options do not match the existing superblock, will be ignored 13:47:26 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:26 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x300) [ 1081.580712][ T6493] new mount options do not match the existing superblock, will be ignored [ 1081.767108][ T6500] new mount options do not match the existing superblock, will be ignored [ 1081.897501][ T6500] new mount options do not match the existing superblock, will be ignored 13:47:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4b49, &(0x7f0000000100)=0x4000000) 13:47:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5421, &(0x7f0000000100)) 13:47:29 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:29 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x3f00) 13:47:29 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', r0, 0x4, 0x1, 0x40, 0x3, 0xc, @remote, @remote, 0x7800, 0x40e9, 0x40, 0x7ff}}) r4 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:29 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xb400) 13:47:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5450, &(0x7f0000000100)) 13:47:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4c01, &(0x7f0000000100)=0x4000000) [ 1084.404561][ T6516] new mount options do not match the existing superblock, will be ignored [ 1084.421499][ T6526] new mount options do not match the existing superblock, will be ignored 13:47:29 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1084.541939][ T27] audit: type=1804 audit(1594734449.302:645): pid=6516 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1346/bus" dev="sda1" ino=16348 res=1 13:47:29 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xb40000) [ 1084.702284][ T6516] new mount options do not match the existing superblock, will be ignored 13:47:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5451, &(0x7f0000000100)) [ 1084.729259][ T27] audit: type=1804 audit(1594734449.492:646): pid=6550 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1346/bus" dev="sda1" ino=16348 res=1 [ 1084.740985][ T6545] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x541b, &(0x7f0000000100)=0x4000000) 13:47:32 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a49afe252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795038000000000000001010e3c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000200)={{0x1, 0x0, @reserved="644097811186127393d610a3ce16f0d6520e3eab3c36e4bb5bae6b7eb15586f2"}}) socket(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:32 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x3000000) 13:47:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5452, &(0x7f0000000100)) [ 1087.457098][ T27] audit: type=1804 audit(1594734452.223:647): pid=6568 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1347/bus" dev="sda1" ino=16356 res=1 13:47:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x8000000) 13:47:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5460, &(0x7f0000000100)) [ 1087.539951][ T6576] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5421, &(0x7f0000000100)=0x4000000) [ 1087.579990][ T27] audit: type=1804 audit(1594734452.343:648): pid=6576 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1347/bus" dev="sda1" ino=16356 res=1 [ 1087.586292][ T6580] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x20) openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) [ 1087.665582][ T6572] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x3f000000) 13:47:32 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x6364, &(0x7f0000000100)) 13:47:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xb4000000000000) 13:47:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5450, &(0x7f0000000100)=0x4000000) [ 1087.975538][ T6601] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8933, &(0x7f0000000100)) [ 1088.054867][ T6606] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1088.096248][ T6605] new mount options do not match the existing superblock, will be ignored 13:47:32 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x24}}, 0x4000) r5 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:33 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x300000000000000) [ 1088.410912][ T6624] new mount options do not match the existing superblock, will be ignored [ 1088.431314][ T6627] new mount options do not match the existing superblock, will be ignored [ 1088.554697][ T6627] new mount options do not match the existing superblock, will be ignored 13:47:35 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5451, &(0x7f0000000100)=0x4000000) 13:47:35 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x800000000000000) 13:47:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xaf01, &(0x7f0000000100)) 13:47:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:35 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:35 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800a0000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=@deltfilter={0x10a0, 0x2d, 0x400, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r0, {0xb, 0xf}, {0x8, 0xe}, {0xfff2, 0x7}}, [@TCA_CHAIN={0x8, 0xb, 0xff}, @TCA_CHAIN={0x8, 0xb, 0x8001}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x1014, 0x2, [@TCA_CGROUP_ACT={0x14c, 0x1, [@m_connmark={0x148, 0x1c, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x80, 0x8, 0x4, 0x6, 0x8}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0xffffff98, 0x10000004, 0x7, 0x6}, 0x18b}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9, 0x8, 0x20000000, 0x6, 0x3}, 0x1}}]}, {0xc1, 0x6, "4979fc03d32d98a91b3449e54844376f4244082584158850bb9a70c76cd76a27aa7d30ea973d1339e0b6f4f559febc2c59cbeec57f7b38af9af1c4d34c4a26fc336678280c4cb7c518c3ef7f8ac7e8ad0de82f306c607116d08804f9ab5ac3db0480594e28bfe5086e8a8a962530ea14201dae933e4374aece21a4dc41efdc556eb88d05cf383a750f2e208881eaf15b95f793e9bec7ecb3319752bf619ffadd8e915e731a18b0ab6d43b38ce14b316ed1dc40734b9f0c1e27260405d5"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_CGROUP_ACT={0x534, 0x1, [@m_tunnel_key={0x90, 0x16, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x60, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @loopback}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x8}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast1}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_connmark={0xc0, 0xc, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x400, 0xffff, 0x5, 0x5f3, 0xe9}, 0x7ff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x9, 0x3, 0x7, 0x40}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x2, 0x6, 0x9, 0x3f}, 0xfffb}}]}, {0x3c, 0x6, "a72c7045693fd4723731c1c84b90eac06b54780e1f74ef5842acb430c25be530a35e023fdfc7c8cd59c37320a1b8a9d546f9ee7bf5cb1e64"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_ct={0x7c, 0x13, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e20}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @broadcast}]}, {0x43, 0x6, "8b3824fba4bb0224cfd788053dfb529cc69ca8e42b5769b2a1ffa364381acbe6fc043b1b9cc0e4f17f841110badfa9cb0b4cc919db87acd208709e79a4263d"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_vlan={0xdc, 0x4, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xdc}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x1, 0x40, 0x10000000, 0x20, 0x7}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x84f, 0x775, 0x8, 0x5306, 0x8}, 0x3}}]}, {0x65, 0x6, "86d1ff84f5a4c2b69bd3742b14baf6587363b42f61eed5d5a7b5796bcda41e879c6245ddafe066e7bc8aec58e4426b3e573918806677333150b3901fa6da8ae01285523c932757fe7831f287e126ba66ce1ba16d6c47321f53f752bdf3c766d79c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0x124, 0x1, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x84, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}, @TCA_IPT_TARG={0x5a, 0x6, {0x7fff, 'mangle\x00', 0x2, 0x0, "d01fec7e411c5ab26054eb5be8cc514295728d09ddafdb3512dfa0cad49a85752d51d667befee292b100c92c65290bf1"}}]}, {0x7a, 0x6, "16d5b89cc5f84ac1d9e0166f70db60654b77067429108e84e731918ecd8736baaf6e35f919914c8e630ae89f8b253cb0d19ebfb9dc525f773f4cfb004df709e636ed845a196dd5bac50056518af86aa2f017fdbb248ee4792a363f2ddfcddf1d98820a684537f0f201753baaf75b7fc42ceb29b83412"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_skbmod={0x164, 0x16, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x48, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_DMAC={0xa, 0x3, @broadcast}, @TCA_SKBMOD_DMAC={0xa, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xffff, 0x5, 0x10000000, 0x1a4, 0xfffffc00}, 0x1}}]}, {0xf1, 0x6, "6b6d2d737f44fe2842c4f180a1740e44c498f99d739694a0f4aa97ab16f402c3f3a35c64d45370645df41f854141c98885d28b521a4ca428d8d60b878137d7c1663cb6cecb0e5f75cd097970a4883113f6aee308315b07364af2df2265bd9d58a118df01c943cc4221783d807a72374dde1c501d855c26fe4ce27f61862dd66ff2d2287c144fa1cdeca8f1cc3fc4bf164b6ece5ee88239fd1ac08fbae376783336fd88cde14bfeebaeaed9d530224a53eb06dfb1b8d41855648dd0cf7914e33d7ac81bab52eccf5a751b4cbb9150593cb292c7c6c79894e11d638834a36a7101b7f19a6a5cf1766a6c4b0cc973"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_CGROUP_ACT={0x154, 0x1, [@m_simple={0x150, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0xc01, 0x9, 0xe4251e127f13d156, 0x2, 0x1f}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x1e, 0x3, 'cpuset.memory_spread_slab\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x100, 0x80, 0x3, 0x2d8, 0x9}}]}, {0xcc, 0x6, "cf58c6335b14c2c3452d413a674445dfcd328dc78b5616f6fc3776b470554de3d3a4880d56b73317ac0d1d1dee5f18be5b39399f7f0bb7c7000d50157c1e4ba0e30fc5e8a658736fd2638b947a6a34c87332be9c69e98a7e0300c6e5c790861b8071e45e49a2fc2655537b3618a51cf912715f96481a2f9f7fc5934052820d922a54e73016fe4f6bbe9ef454683bca981f11058fead8ca008df466c3a3c5352a017d4b80cd9f713a2e21bb53c611269d843843ca13f45b9377927454c8606ef03d9ff9f2905d30aa"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_CGROUP_POLICE={0x828, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x883, 0x49b1, 0x8001, 0x7, 0x1f, 0x80, 0x3, 0x4, 0x10000, 0x10000, 0x7, 0x10000, 0x7, 0x8, 0x31, 0x9, 0xffffffff, 0xccb4, 0x10001, 0x3, 0x1ff, 0x6, 0x400, 0x2, 0x0, 0xc4ca, 0x4, 0x0, 0x8000, 0x82, 0xfffeffff, 0x2, 0x2, 0x9, 0x5, 0x8, 0x4ff5e805, 0x9, 0x4, 0x3, 0x2, 0x40, 0x6, 0x60be1940, 0x4, 0x101, 0x2, 0x1ff, 0x3, 0x7f, 0xfffffff9, 0x7fff, 0x9, 0x80000000, 0x5, 0x4, 0x7, 0x81, 0x8, 0x7fff, 0x8, 0xab33, 0x34480000, 0x1f, 0x8, 0xf9, 0x80000001, 0x15, 0x8, 0x8, 0x8, 0xa6, 0x2, 0x8, 0x100, 0x401, 0x4, 0x6, 0x2, 0x5, 0x3, 0x0, 0x6, 0x2, 0x7, 0x9, 0x0, 0x80000000, 0xfffffffa, 0x4, 0x3ff, 0x0, 0x3, 0x7, 0xe0e, 0x80, 0x2, 0x3, 0xffff, 0x3, 0x4, 0x4, 0x2, 0x5, 0x8000, 0x9, 0xfffff001, 0xfffffff9, 0x7, 0x2b5, 0x0, 0x3, 0x1, 0x4, 0x2, 0x10001, 0xa7, 0x3ff, 0x3, 0x1, 0x10001, 0x1, 0x621, 0x4, 0x4, 0x9de9, 0x5, 0x1f, 0xffffffff, 0x5, 0xa42a, 0x5, 0xffffffe1, 0x9, 0x6, 0xde6, 0xb3, 0x10000, 0x2, 0xfffffff8, 0x0, 0x4, 0x3e8, 0x0, 0x4, 0x8, 0x200, 0x4, 0x5, 0xa74, 0x9, 0x2, 0x7fffffff, 0x59, 0x0, 0x3, 0x0, 0x7, 0x0, 0xd547, 0x9, 0x0, 0x244, 0x8, 0x1, 0x4, 0xf1, 0x6, 0xe552, 0x6, 0x7, 0x0, 0x2, 0x1, 0x0, 0x7ff80, 0x8, 0x7, 0x5, 0x1, 0x7fffffff, 0x5, 0x1, 0x92, 0x3, 0x4, 0x8, 0x101, 0xdbc2f2e, 0x2, 0xf8, 0x0, 0x7fffffff, 0xffffffff, 0x5, 0x666, 0x8, 0xf, 0x0, 0x7ff, 0x0, 0x6, 0x6489, 0x4, 0x0, 0x1, 0x100, 0x8, 0x11d, 0x3, 0x7, 0x9, 0x2, 0xda8, 0x760c, 0x7f, 0x400, 0x9, 0xea, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x400, 0x20, 0x1, 0xc85d, 0x1, 0x8591, 0x1, 0x4, 0x173, 0x3ff, 0xfffffffe, 0x0, 0x0, 0x3fd1, 0xfffffeff, 0x13d, 0x0, 0x0, 0x1, 0xfff, 0x400000, 0xff, 0x8, 0x9, 0x5, 0x200, 0x9ff88b00, 0x1, 0x8000, 0x9, 0x81]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_RATE64={0xc, 0x8, 0x5}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7fff, 0x1, 0x2eb, 0x2, 0xffffff01, 0x7, 0x709, 0xbd28, 0x5, 0x7ff, 0x1f, 0xfffffffc, 0x9, 0x0, 0xeca, 0x8, 0x8, 0x8000, 0x1, 0x0, 0x9, 0x80000001, 0x5, 0x3f, 0xbc, 0x2, 0xfffffffe, 0x9, 0x200, 0x2, 0x81, 0x7, 0x0, 0x8001, 0x6a, 0x0, 0x4, 0x8000, 0x100, 0x1000, 0xfffffff8, 0x6, 0x7fff, 0x5, 0xffff, 0xc316, 0xffff0000, 0x926, 0x8000, 0x7, 0x8000, 0x5, 0x3ff, 0x8001, 0x5, 0x9, 0xfff, 0x3ff, 0x8001, 0x1ff, 0x9, 0x2, 0x6, 0x5, 0x0, 0x4, 0x0, 0x3, 0xfff, 0x4b6b, 0x80000001, 0x80, 0xffffffff, 0x0, 0x0, 0xebe, 0x10001, 0x0, 0x3, 0x10001, 0x800, 0x8000, 0x4, 0x1e2ae15d, 0x101, 0x1, 0x0, 0x48, 0x0, 0xd48, 0x1, 0x9, 0x7, 0xfffffc5b, 0x8, 0x3, 0x7, 0x7f, 0xa5f2, 0x8, 0x10000, 0xa457, 0x5, 0x80, 0x48, 0x1, 0xa0, 0x56c, 0x7, 0x6, 0x9, 0xc0000000, 0x3, 0x400, 0x1, 0xe8d, 0x10000, 0x2, 0xe14, 0xffffffdf, 0x80, 0x6, 0xfffffff9, 0xd4, 0x9, 0x8, 0xffffff7f, 0x0, 0x40, 0x8001, 0x5, 0x400, 0xdf, 0x0, 0x4c, 0x1, 0x4, 0x1, 0x7, 0xfffffbff, 0x5, 0x10000, 0x7, 0x4, 0xfffffffd, 0x3, 0x1, 0xb1, 0x2, 0x9, 0x5, 0xfffffff8, 0x9, 0x20, 0xfffffffd, 0x8, 0xffff, 0x200, 0x6, 0x4, 0x3ff, 0x1f, 0x3, 0x7f, 0x7, 0x2, 0x3b73, 0x0, 0x73035b45, 0x9, 0x100, 0x8, 0x3, 0x2, 0x0, 0x4000000, 0xfffeffff, 0xfffffff7, 0x7, 0x5, 0x100, 0xf2c7, 0x5, 0x7fffffff, 0x38, 0x9, 0x8, 0x8, 0x20, 0x5, 0x1, 0x6, 0x2b794c5a, 0xffffffff, 0x9, 0x101, 0x7f, 0x3, 0x7, 0x5, 0xdf29, 0x101, 0x8, 0x100, 0x7, 0xffffff7f, 0x6, 0x7, 0x5, 0x3, 0x6, 0x8000, 0xff, 0xfffffffb, 0x4, 0xfff, 0x1000, 0x6, 0xfff, 0x4, 0x3, 0x1ff, 0x3f, 0x100, 0x7, 0x843, 0x3, 0x800, 0x3, 0x8, 0x80000000, 0x2, 0x3, 0x4, 0x1, 0x5, 0x9, 0x14000, 0x7, 0x10000, 0x81, 0x100, 0x4, 0x1, 0xa533, 0x0, 0x4, 0x9bf2, 0x401, 0x0, 0x3, 0x7, 0x6, 0x8001, 0x80000000, 0x4d8c]}, @TCA_POLICE_RESULT={0x8, 0x5, 0xa44}]}, @TCA_CGROUP_EMATCHES={0x14, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7ff}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffc1}}]}]}}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x34, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'gretap0\x00'}, @TCA_FW_MASK={0x8, 0x5, 0x5}, @TCA_FW_INDEV={0x14, 0x3, 'bridge0\x00'}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x2}}]}, 0x10a0}, 0x1, 0x0, 0x0, 0x20000010}, 0x4080) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:35 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x3f00000000000000) [ 1090.846596][ T6643] new mount options do not match the existing superblock, will be ignored 13:47:35 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5452, &(0x7f0000000100)=0x4000000) 13:47:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xaf02, &(0x7f0000000100)) [ 1090.945279][ T6655] ptrace attach of "/root/syz-executor.3"[6654] was attempted by "/root/syz-executor.3"[6655] 13:47:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:35 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1090.980237][ T27] audit: type=1804 audit(1594734455.743:649): pid=6649 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1350/bus" dev="sda1" ino=16340 res=1 [ 1091.012370][ T6653] new mount options do not match the existing superblock, will be ignored [ 1091.138648][ T27] audit: type=1804 audit(1594734455.893:650): pid=6649 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1350/bus" dev="sda1" ino=16340 res=1 [ 1091.139663][ T6672] new mount options do not match the existing superblock, will be ignored 13:47:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x5460, &(0x7f0000000100)=0x4000000) 13:47:36 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xffffffff00000000) 13:47:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x400454ca, &(0x7f0000000100)) 13:47:36 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) r1 = dup(0xffffffffffffffff) ioctl$SIOCPNENABLEPIPE(r1, 0x89ed, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x420082, 0x0) fchmodat(r4, &(0x7f00000002c0)='./file1\x00', 0x48) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1091.252076][ T6674] new mount options do not match the existing superblock, will be ignored 13:47:36 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x6364, &(0x7f0000000100)=0x4000000) 13:47:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40049409, &(0x7f0000000100)) 13:47:36 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x105002, 0x352e05be61e6ce7) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000019300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="6ffe0000000000000000040000001c0001801500010069623a7665746e315f746f5f626f6e6400000000"], 0x30}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r5, 0x800, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8ef851cd}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x80d1) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="d421e730405048ff1074440d9c3b9376d0b17450000000", @ANYRES16=r7, @ANYBLOB="01000000000000000000090000003c0003800800010001000000140002007663616e300000000000000000000000080003000000000014000600ff020000000000000000000000000001"], 0x50}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r7, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}}, 0x4000) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1091.549832][ T6685] new mount options do not match the existing superblock, will be ignored [ 1091.619900][ T6690] new mount options do not match the existing superblock, will be ignored [ 1091.653910][ T6688] new mount options do not match the existing superblock, will be ignored [ 1091.668190][ T27] audit: type=1800 audit(1594734456.433:651): pid=6701 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16337 res=0 13:47:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x890c, &(0x7f0000000100)=0x4000000) 13:47:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40086602, &(0x7f0000000100)) [ 1091.802953][ T27] audit: type=1800 audit(1594734456.503:652): pid=6703 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16337 res=0 13:47:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:38 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:38 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0xf0dc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x240041, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:38 executing program 1: r0 = socket$inet6(0xa, 0xa, 0x1f) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000180)) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000000c0)=@gcm_128={{0x304}, "6ffc19d27835c5dd", "2d362920869f1de3203ee99a0274682a", "5cf0abe1", "97e71ff95e04e5dd"}, 0x28) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) tee(0xffffffffffffffff, r5, 0x8000, 0x6) 13:47:38 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8933, &(0x7f0000000100)=0x4000000) 13:47:38 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40087602, &(0x7f0000000100)) [ 1094.212961][ T27] audit: type=1804 audit(1594734458.983:653): pid=6717 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1252/bus" dev="sda1" ino=16337 res=1 13:47:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x89e8, &(0x7f0000000100)=0x4000000) 13:47:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)) [ 1094.257772][ T6721] new mount options do not match the existing superblock, will be ignored [ 1094.294284][ T6718] new mount options do not match the existing superblock, will be ignored 13:47:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1094.367391][ T27] audit: type=1804 audit(1594734458.983:654): pid=6718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1352/bus" dev="sda1" ino=16335 res=1 [ 1094.409147][ T6733] new mount options do not match the existing superblock, will be ignored 13:47:39 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000200)={'gretap0\x00', r2, 0x1, 0x8000, 0x90d2, 0xffffffbb, {{0x5, 0x4, 0x1, 0x6, 0x14, 0x65, 0x0, 0x9, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x21}, @private=0xa010101}}}}) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1094.526077][ T27] audit: type=1804 audit(1594734459.073:655): pid=6726 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1252/bus" dev="sda1" ino=16337 res=1 13:47:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af25, &(0x7f0000000100)) 13:47:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xaf01, &(0x7f0000000100)=0x4000000) [ 1094.630550][ T6745] new mount options do not match the existing superblock, will be ignored [ 1094.648860][ T27] audit: type=1804 audit(1594734459.083:656): pid=6726 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1252/bus" dev="sda1" ino=16337 res=1 13:47:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1094.724373][ T6749] new mount options do not match the existing superblock, will be ignored [ 1094.778542][ T27] audit: type=1804 audit(1594734459.173:657): pid=6718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1352/bus" dev="sda1" ino=16335 res=1 13:47:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af30, &(0x7f0000000100)) [ 1094.920918][ T6759] new mount options do not match the existing superblock, will be ignored [ 1094.994454][ T6749] new mount options do not match the existing superblock, will be ignored [ 1095.005479][ T27] audit: type=1804 audit(1594734459.774:658): pid=6769 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1252/bus" dev="sda1" ino=16337 res=1 13:47:39 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f00000000c0)=r4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:39 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xaf02, &(0x7f0000000100)=0x4000000) 13:47:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1095.284638][ T6780] new mount options do not match the existing superblock, will be ignored 13:47:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40186366, &(0x7f0000000100)) 13:47:42 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x200000, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:42 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000140)={[{0x1, 0x401, 0x81, 0x4, 0x1, 0x3, 0x0, 0x5, 0x6, 0x9, 0x7, 0x7, 0x7}, {0x9, 0x9, 0xff, 0x40, 0x40, 0x3f, 0x2, 0x1, 0x9d, 0x1, 0xfd, 0x20, 0x3}, {0x0, 0x4, 0x43, 0xd9, 0x1, 0x0, 0x7, 0xff, 0x5d, 0x0, 0x0, 0x9, 0x7cf1f36b}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) r4 = dup(0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a8e8b0b12abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r5}, {r4, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x400454ca, &(0x7f0000000100)=0x4000000) 13:47:42 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1097.432593][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 1097.432607][ T27] audit: type=1804 audit(1594734462.204:661): pid=6794 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 [ 1097.478186][ T6791] new mount options do not match the existing superblock, will be ignored [ 1097.528688][ T6795] new mount options do not match the existing superblock, will be ignored 13:47:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40049409, &(0x7f0000000100)=0x4000000) [ 1097.558088][ T27] audit: type=1804 audit(1594734462.254:662): pid=6794 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 [ 1097.631015][ T6803] new mount options do not match the existing superblock, will be ignored [ 1097.707452][ T27] audit: type=1804 audit(1594734462.264:663): pid=6794 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 13:47:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4020940d, &(0x7f0000000100)) 13:47:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x264020, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10, 0xbd12, 0x3, 0x7ff, 0x0, 0x1, 0x6, [], r0, r1, 0x5, 0x4, 0x2}, 0x40) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x200, &(0x7f00000002c0)=0x4) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000500)) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:42 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40086602, &(0x7f0000000100)=0x4000000) [ 1097.937078][ T6826] new mount options do not match the existing superblock, will be ignored [ 1097.972225][ T6824] new mount options do not match the existing superblock, will be ignored 13:47:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1098.044928][ T6824] new mount options do not match the existing superblock, will be ignored [ 1098.243534][ T27] audit: type=1804 audit(1594734463.014:664): pid=6846 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 13:47:43 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80086301, &(0x7f0000000100)) 13:47:43 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x10) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40087602, &(0x7f0000000100)=0x4000000) 13:47:43 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x44000, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) listxattr(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)=""/115, 0x73) dup3(r4, r3, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='wg0\x00', 0x4) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) ioctl$EVIOCSFF(r5, 0x40304580, &(0x7f0000000140)={0x56, 0x3f, 0x101, {0x0, 0x70b4}, {0x37f, 0x387}, @period={0x58, 0x1000, 0x80, 0x3974, 0x8aeb, {0x1384, 0xffff, 0x2d34, 0x100}, 0x4, &(0x7f0000000280)=[0x8, 0x21c, 0x6, 0x5]}}) write$cgroup_netprio_ifpriomap(r3, &(0x7f00000000c0)={'macvlan0', 0x32, 0x30}, 0xb) [ 1098.287198][ T27] audit: type=1804 audit(1594734463.054:665): pid=6846 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 13:47:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1098.416433][ T6860] new mount options do not match the existing superblock, will be ignored [ 1098.485921][ T27] audit: type=1804 audit(1594734463.054:666): pid=6843 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1254/bus" dev="sda1" ino=16355 res=1 13:47:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80086601, &(0x7f0000000100)) 13:47:43 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af02, &(0x7f0000000100)=0x4000000) 13:47:43 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0x7f, 0x3, 0x81, 0x0, 0x13, "c47c7eabe021072a"}) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0xa2040, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000100)=r5) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) [ 1098.631812][ T27] audit: type=1804 audit(1594734463.264:667): pid=6874 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1255/bus" dev="sda1" ino=16377 res=1 [ 1098.693502][ T6878] new mount options do not match the existing superblock, will be ignored [ 1098.717282][ T27] audit: type=1800 audit(1594734463.264:668): pid=6874 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16377 res=0 [ 1098.754042][ T6886] new mount options do not match the existing superblock, will be ignored [ 1098.775420][ T27] audit: type=1804 audit(1594734463.264:669): pid=6874 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1255/bus" dev="sda1" ino=16377 res=1 13:47:43 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000200)={0x7, 0x4b, 0x1}, 0x7) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1098.807757][ T27] audit: type=1804 audit(1594734463.264:670): pid=6874 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1255/bus" dev="sda1" ino=16377 res=1 13:47:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af03, &(0x7f0000000100)=0x4000000) 13:47:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80087601, &(0x7f0000000100)) 13:47:43 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:43 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x1f, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) getsockopt$X25_QBITINCL(r5, 0x106, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) ppoll(&(0x7f0000000000)=[{r4}, {r3, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:43 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af00, &(0x7f0000000100)) 13:47:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af04, &(0x7f0000000100)=0x4000000) [ 1099.089415][ T6907] new mount options do not match the existing superblock, will be ignored [ 1099.157929][ T6905] new mount options do not match the existing superblock, will be ignored [ 1099.246411][ T6900] new mount options do not match the existing superblock, will be ignored 13:47:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:46 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:46 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='macsec0\x00', 0x10) dup3(r1, r0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x400a905) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="007bf603806264ffc6a286189e88afb0fadfb4a1d50fd91d"], 0x18, 0x0) 13:47:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0045878, &(0x7f0000000100)) 13:47:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af05, &(0x7f0000000100)=0x4000000) 13:47:46 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f00000000c0), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "87b856e7a3fbb49f", "4d75d6f2dc05a8bf5673e0a2dbb5a8df", "ca36e65a", "cb38cfe27cb96fc3"}, 0x28) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1101.652705][ T6934] new mount options do not match the existing superblock, will be ignored 13:47:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af06, &(0x7f0000000100)=0x4000000) 13:47:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0045878, &(0x7f0000000100)) 13:47:46 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:46 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x90480, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af07, &(0x7f0000000100)=0x4000000) [ 1102.006393][ T6964] new mount options do not match the existing superblock, will be ignored 13:47:46 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x8) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xeb, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x28, &(0x7f0000000140)}, 0x10) [ 1102.093489][ T6968] new mount options do not match the existing superblock, will be ignored [ 1102.203316][ T6968] new mount options do not match the existing superblock, will be ignored 13:47:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0189436, &(0x7f0000000100)) 13:47:49 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af08, &(0x7f0000000100)=0x4000000) 13:47:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000008, r3, &(0x7f00000000c0)='./file0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000140)=[{r4}, {r1, 0x340d}], 0x2, 0x0, 0x0, 0x0) 13:47:49 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8084200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0x78, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="e67d95873060"}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x78}, 0x1, 0x0, 0x0, 0x1}, 0x1) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r5 = socket$caif_seqpacket(0x25, 0x5, 0x5) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000200)={0x3, 'veth1\x00', {0x42030000}, 0x3}) [ 1104.718321][ T27] kauditd_printk_skb: 20 callbacks suppressed [ 1104.718335][ T27] audit: type=1804 audit(1594734469.485:691): pid=6997 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1260/bus" dev="sda1" ino=16342 res=1 [ 1104.746164][ T6998] new mount options do not match the existing superblock, will be ignored 13:47:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc01c64a3, &(0x7f0000000100)) 13:47:49 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x301000) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x9c91, 0x6, 0xb, 0x1b, "10687b36b610a11d394fc60f6ee5420aa773f5763f5604d22806b454741fc2d66f9bb46ceb22288f113f07c0bb40e4ef32a20c56b93b5a3efae644fd7184831c", "04e493b9a878029c41af5031764ac5ba16eabf676239d8b249ab0b26b463970b", [0x3, 0x8]}) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1104.778597][ T7001] new mount options do not match the existing superblock, will be ignored 13:47:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af25, &(0x7f0000000100)=0x4000000) [ 1104.867551][ T7009] new mount options do not match the existing superblock, will be ignored [ 1104.881220][ T27] audit: type=1804 audit(1594734469.545:692): pid=6997 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1260/bus" dev="sda1" ino=16342 res=1 13:47:49 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x200, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:49 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xbb5bd31e26025cb1}, r0, 0xb, 0xffffffffffffffff, 0x0) socket(0x27, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000100)=0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1105.075768][ T27] audit: type=1804 audit(1594734469.845:693): pid=7023 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1262/bus" dev="sda1" ino=16362 res=1 [ 1105.126078][ T27] audit: type=1804 audit(1594734469.895:694): pid=7023 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1262/bus" dev="sda1" ino=16362 res=1 [ 1105.140972][ T7024] new mount options do not match the existing superblock, will be ignored [ 1105.202239][ T7030] new mount options do not match the existing superblock, will be ignored [ 1105.266878][ T7034] new mount options do not match the existing superblock, will be ignored 13:47:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af30, &(0x7f0000000100)=0x4000000) 13:47:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc020660b, &(0x7f0000000100)) 13:47:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:52 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r5, 0x9, 0x5a, "aa4ebd169e9cf8e51f07060197d23477d027d9593f7a4805e4fbeb5d7123a7b9a19f0c24ea99c71e80a277cd4a495985d5ea72e5a509061200cdd4330f53ec804a69af6f85f19dc583e4a357da7c8ef9a10b417c6d78a7f70abd"}, 0x62) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000180)={0x800, 0x1, 0x4, 0x10000, 0x3000000, {0x0, 0x2710}, {0x1, 0x1, 0x3, 0x3, 0x1, 0x9, "578f0c3a"}, 0x3, 0x1, @planes=&(0x7f0000000140)={0x7, 0x6, @fd=r1, 0x5}, 0x7, 0x0, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x82, 0x1, 0x38, "b1d4ce99f2c02f0571e88d5f81fbbe5b", "fd357022b29884272e772140559d77c7f53dff9b2e21100b6bae44a690714ead86d4080b9f6885d3084cc7453d9e089939a5c4107d5bb7001e546d3ab623a3041c731d840332e68aa3b0bd532aa2ea5d2c6d0e60a66ed6e03d9d282379ebabe5405b8952330d0ee2ef0088a733"}, 0x82, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:47:52 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:52 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000240)={0xf000000, 0x8, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x990a96, 0x401, [], @value64}}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xdd4e) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1a, 0x3, 0x6) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xfffffffffffffee0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1107.805120][ T27] audit: type=1804 audit(1594734472.575:695): pid=7047 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1362/bus" dev="sda1" ino=16001 res=1 13:47:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008ff00, &(0x7f0000000100)=0x4000000) 13:47:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x2) 13:47:52 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1107.932136][ T7047] new mount options do not match the existing superblock, will be ignored [ 1107.989069][ T27] audit: type=1804 audit(1594734472.755:696): pid=7047 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1362/bus" dev="sda1" ino=16001 res=1 [ 1108.034973][ T7066] new mount options do not match the existing superblock, will be ignored 13:47:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x40186366, &(0x7f0000000100)=0x4000000) 13:47:52 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:53 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x3) 13:47:53 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x401870c8, &(0x7f0000000100)=0x4000000) [ 1108.397974][ T7080] new mount options do not match the existing superblock, will be ignored [ 1108.445412][ T7086] new mount options do not match the existing superblock, will be ignored [ 1108.542271][ T7088] new mount options do not match the existing superblock, will be ignored 13:47:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x4) 13:47:55 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4020940d, &(0x7f0000000100)=0x4000000) 13:47:55 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x27, 0x6, 0x3) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x4000800) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000200), &(0x7f0000000240)=0x8) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:55 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0xce24, 0x0, @rand_addr=' \x01\x00', 0x3}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e22, 0x3, @ipv4={[], [], @multicast1}, 0x6da}, {0xa, 0x4e20, 0x7, @loopback, 0x86b}, 0x80, [0xaf, 0x2f89447a, 0x9, 0x7, 0x100, 0x2, 0x9, 0x1]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 1110.992453][ T7104] new mount options do not match the existing superblock, will be ignored 13:47:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x5) [ 1111.038811][ T7108] new mount options do not match the existing superblock, will be ignored 13:47:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80086301, &(0x7f0000000100)=0x4000000) 13:47:55 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1111.096879][ T7117] new mount options do not match the existing superblock, will be ignored 13:47:55 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0xa0042, 0xd0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f00000002c0)={{0x55, 0x80}, {0x0, 0x7}, 0x2f5, 0x1, 0x9}) 13:47:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80086601, &(0x7f0000000100)=0x4000000) 13:47:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x6) [ 1111.310693][ T7125] new mount options do not match the existing superblock, will be ignored [ 1111.386056][ T7128] new mount options do not match the existing superblock, will be ignored [ 1111.419100][ T27] audit: type=1804 audit(1594734476.185:697): pid=7128 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1365/bus" dev="sda1" ino=16357 res=1 [ 1111.505134][ T7128] new mount options do not match the existing superblock, will be ignored [ 1111.529540][ T27] audit: type=1804 audit(1594734476.295:698): pid=7138 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1365/bus" dev="sda1" ino=16357 res=1 13:47:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:47:58 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:47:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x7) 13:47:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x80087601, &(0x7f0000000100)=0x4000000) 13:47:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f00000002c0)='./file1\x00', 0x702, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000240)={0x6, 'ip6gre0\x00', {0x4}, 0x42}) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYRESOCT=r0, @ANYRES32, @ANYRES16=r2, @ANYBLOB="b3acba65d6230397ee6906b5ff8e48ae87ba911f60545a2bc845855ee366d50961e1458ce3ec546c2c9a3183d70383b4558eadd8b208dfe366eb67e356d41ea14c4abd3d32dc6e37b78873367f8b6991c573f0c5dc5031c6f9d89cb8fd39", @ANYRES64, @ANYRES64], 0x1) dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@int=0x5d70555e, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:58 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r4, &(0x7f0000000140)=0x4) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) r6 = dup(r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) sendmsg$DEVLINK_CMD_TRAP_SET(r6, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="d8000000", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fedbdf253e000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830001000000080001007063690011000200303030303a30303a31302e30000000001c008200736f757263655f6d61635f69735f6d756c7469636173740005008300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c005f6d61635f69735f6d756c7469636173740005008300010000007528026c406e52b62b297a2b7786ad945bea200ebb4123f3ba67ecb8c857e66ca60bb80ab01be8fe2d724c61001162954c7b4ce2101b76b4abbbf1516df25da3d659aac81b76dd24b42ec5ed445c40d52cac150951395a4c254b57f6fdcc98f458a2730d1ed819abcd3135ed24ebe23297743db90000000000000000"], 0xd8}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x2, &(0x7f0000000280)=@ccm_128={{0x304}, "2b775d25c2b0c3a2", "e6217d41dc190fc47a427b5353a0155f", "37eb5304", "b952a8406b5baf98"}, 0x28) ppoll(&(0x7f0000000000)=[{r7}, {r6, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1114.083958][ T7154] new mount options do not match the existing superblock, will be ignored [ 1114.112464][ T7156] new mount options do not match the existing superblock, will be ignored 13:47:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af00, &(0x7f0000000100)=0x4000000) 13:47:59 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1114.183628][ T7163] new mount options do not match the existing superblock, will be ignored 13:47:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x8) 13:47:59 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:47:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x4000000) 13:47:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x300) [ 1114.478362][ T7182] new mount options do not match the existing superblock, will be ignored [ 1114.521478][ T7179] new mount options do not match the existing superblock, will be ignored [ 1114.599435][ T7179] new mount options do not match the existing superblock, will be ignored 13:48:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:01 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0044dff, &(0x7f0000000100)=0x4000000) 13:48:01 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000500)={0x0, 0x0, @ioapic}) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x500) 13:48:01 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='-@\x00', 0x0) readahead(r0, 0x0, 0xffffffff00000000) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000000c0)={0xfffffffe, 0xfffffffc, 0x2, 0x1, 0x20, "215388754b2b7f7415e100a263559975e904de", 0x7, 0x20}) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r3}, {r2, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1117.190074][ T27] audit: type=1804 audit(1594734481.966:699): pid=7206 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1368/bus" dev="sda1" ino=16339 res=1 13:48:02 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) openat$cgroup_netprio_ifpriomap(r3, &(0x7f00000000c0)='net_prio.ifpriomap\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x600) 13:48:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0045878, &(0x7f0000000100)=0x4000000) [ 1117.340657][ T7206] new mount options do not match the existing superblock, will be ignored 13:48:02 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1117.467959][ T27] audit: type=1804 audit(1594734482.236:700): pid=7225 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1267/bus" dev="sda1" ino=16345 res=1 13:48:02 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) [ 1117.527960][ T7233] new mount options do not match the existing superblock, will be ignored 13:48:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x700) [ 1117.568935][ T27] audit: type=1804 audit(1594734482.256:701): pid=7228 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1267/bus" dev="sda1" ino=16345 res=1 [ 1117.702422][ T27] audit: type=1804 audit(1594734482.286:702): pid=7206 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1368/bus" dev="sda1" ino=16339 res=1 [ 1117.709768][ T7234] new mount options do not match the existing superblock, will be ignored 13:48:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:04 executing program 0: clone(0x20006004f7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000061114c000000000095000000e590b7ab0000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0045878, &(0x7f0000000100)=0x4000000) 13:48:04 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = userfaultfd(0x80800) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='.\x00', 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000380)={r4, 0x12, 0xeb}, &(0x7f00000003c0)=ANY=[], &(0x7f0000000440)="60bfe88e25a8e65d39dbb2be04e3769b11fc", &(0x7f0000000600)=""/235) keyctl$reject(0x13, 0x0, 0x81, 0x80000000, r4) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) ppoll(&(0x7f0000000000)=[{r3}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:04 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x3f00) 13:48:05 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) getsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2c8700, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000100)=0xf4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc0189436, &(0x7f0000000100)=0x4000000) [ 1120.265893][ T7261] new mount options do not match the existing superblock, will be ignored [ 1120.286255][ T7256] new mount options do not match the existing superblock, will be ignored 13:48:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xff00) 13:48:05 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1120.400485][ T7277] new mount options do not match the existing superblock, will be ignored 13:48:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0xc020660b, &(0x7f0000000100)=0x4000000) 13:48:05 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1120.610874][ T7284] new mount options do not match the existing superblock, will be ignored [ 1120.657252][ T7290] new mount options do not match the existing superblock, will be ignored [ 1120.723788][ T7290] new mount options do not match the existing superblock, will be ignored 13:48:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "c6820b5f37a7e5ea", "3aa9ade856c9a54c1ac6cf3ed293de22", "c7b2d653", "c1f46efb9e19c3d2"}, 0x28) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x1) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={r6, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r7, 0x10001}, 0x8) 13:48:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x1000000) 13:48:07 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x1000000) 13:48:07 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:07 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) 13:48:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x2000000) [ 1123.329821][ T7307] new mount options do not match the existing superblock, will be ignored 13:48:08 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x2000000) 13:48:08 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1123.509850][ T7311] new mount options do not match the existing superblock, will be ignored 13:48:08 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x3000000) 13:48:08 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x3000000) [ 1123.737003][ T7331] new mount options do not match the existing superblock, will be ignored [ 1123.835552][ T7337] new mount options do not match the existing superblock, will be ignored [ 1123.902834][ T7337] new mount options do not match the existing superblock, will be ignored 13:48:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:11 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x4000000) 13:48:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000002) 13:48:11 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200), 0x4) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:11 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:11 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={{0x1, 0x0, @reserved="f10ad594977de1316d8d7626ea569d2e4ff183f081664bd67f1a7ac87eac2c12"}}) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) r5 = dup(r2) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r6, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ioctl$FS_IOC_GETFSLABEL(r6, 0x81009431, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r6}, {r5, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1126.411135][ T27] audit: type=1804 audit(1594734491.187:703): pid=7364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 [ 1126.434652][ T7362] new mount options do not match the existing superblock, will be ignored [ 1126.443616][ T27] audit: type=1804 audit(1594734491.187:704): pid=7364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 13:48:11 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x5000000) 13:48:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000003) 13:48:11 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2040, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1126.534669][ T7372] new mount options do not match the existing superblock, will be ignored [ 1126.535053][ T27] audit: type=1804 audit(1594734491.187:705): pid=7364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 13:48:11 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1126.685341][ T7362] new mount options do not match the existing superblock, will be ignored [ 1126.707137][ T27] audit: type=1804 audit(1594734491.217:706): pid=7364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 13:48:11 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x2, &(0x7f0000000200)) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) setsockopt(r0, 0x8001, 0x919d, &(0x7f00000002c0)="c84a9d384826774cd47ba601e4037e1fe7f38435b28768bef2a211179f701850e8fabac63efb965b536f48117477eb3358ccba7c619734ec0d3eaf2cb0b7d52e74f3ab34f01c49817df39a463cf30561b12751ab76d1dde0a9b4a48f58996678b83135717656459e234fb5544334fc1d55cbe53c632d6746552cf6b7b08459a27a6093d099939f90a2dad9685a005e264219b4dd8da74a668e27df37b6bd6f8e35b52f8f0476d702ee2de5a882e50d4b889c989d72a063079e2c53dcf990ce", 0xbf) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x1) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x4) r1 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000200000008000300", @ANYRES32=r2, @ANYBLOB="0500590000000010"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800020}, 0xc, &(0x7f0000000f00)={&(0x7f0000001b00)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x9ec}, 0x1, 0x0, 0x0, 0x4040004}, 0x800) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000004) [ 1126.814692][ T27] audit: type=1804 audit(1594734491.217:707): pid=7364 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 [ 1126.884289][ T7388] new mount options do not match the existing superblock, will be ignored [ 1126.944784][ T27] audit: type=1804 audit(1594734491.247:708): pid=7370 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1272/bus" dev="sda1" ino=16331 res=1 [ 1127.019225][ T7396] new mount options do not match the existing superblock, will be ignored [ 1127.027113][ T27] audit: type=1804 audit(1594734491.457:709): pid=7371 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1373/bus" dev="sda1" ino=16328 res=1 [ 1127.112084][ T7396] new mount options do not match the existing superblock, will be ignored 13:48:14 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x5, 0x80000, 0x1ff, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$qrtr(r1, &(0x7f0000000100)={0x2a, 0xffffffff}, 0xc) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000040)=0x100000001, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r4, 0x8000}, &(0x7f0000000180)=0x8) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r0}, {0xffffffffffffffff, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000005) 13:48:14 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x23, 0x6, 0x200) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x6, 0x40) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000240)={0x4, 0x4, 0x401, r0, 0x0, &(0x7f0000000200)={0x9e0902, 0x1, [], @value64=0x8}}) ioctl$FBIOGETCMAP(r2, 0x4604, &(0x7f0000000340)={0x5, 0x1, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:14 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x6000000) 13:48:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x7000000) [ 1129.542090][ T27] audit: type=1804 audit(1594734494.317:710): pid=7419 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1375/bus" dev="sda1" ino=16332 res=1 [ 1129.553714][ T7409] new mount options do not match the existing superblock, will be ignored 13:48:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000006) [ 1129.643294][ T7414] new mount options do not match the existing superblock, will be ignored 13:48:14 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x8000000) [ 1129.750525][ T27] audit: type=1804 audit(1594734494.527:711): pid=7419 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1375/bus" dev="sda1" ino=16332 res=1 [ 1129.753712][ T7435] new mount options do not match the existing superblock, will be ignored 13:48:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000007) 13:48:14 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000200)={{0x1f}, {0x3, 0x1}, 0xffff8e44, 0x4, 0x3}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r3 = socket(0x15, 0x1, 0x2) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, 0x140f, 0x8, 0x70bd27, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xc, 0x45, 'rdma_cm\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xc, 0x45, 'ib_srpt\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'uverbs\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x4010}, 0x8004) [ 1129.947887][ T7438] new mount options do not match the existing superblock, will be ignored [ 1130.082279][ T7448] new mount options do not match the existing superblock, will be ignored [ 1130.233515][ T7450] new mount options do not match the existing superblock, will be ignored 13:48:15 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x125c80, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000300)=""/4096, &(0x7f0000000100)=0x1000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x3, 0x80000) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r3}, {r1, 0x343d}], 0x2, 0x0, 0x0, 0x0) [ 1130.401929][ T7460] mmap: syz-executor.1 (7460) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 13:48:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000008) 13:48:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x3f000000) 13:48:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @dev, @dev}}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:17 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:17 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) fcntl$setflags(r0, 0x2, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x40000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000100)={0x1, 0x0, [0x5, 0x401, 0x8, 0x0, 0x2, 0x80000000, 0x14, 0x3]}) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xfdfdffff) [ 1132.634835][ T7470] new mount options do not match the existing superblock, will be ignored 13:48:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000300) 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1132.693210][ T7471] new mount options do not match the existing superblock, will be ignored 13:48:17 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:17 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x204841, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000240)={0xc, 0x1}) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, 0xffffffffffffffff, 0x0) finit_module(r1, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[r1], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1132.790236][ T7482] new mount options do not match the existing superblock, will be ignored 13:48:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) socketpair(0x9, 0x1, 0xd6e, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r5, 0x5, 0x0, 0x0, {{}, {}, {0xc, 0x18, {0x0, @bearer=@l2={'ib'}}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r5, 0x10, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4008810}, 0x40000) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "d08a84b3b7f9cf56", "2913a68762b17b9570f683164f223358", "a5178e89", "5d6bee3b7ce909c2"}, 0x28) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[], 0x1) dup3(r7, r6, 0x0) finit_module(r7, 0x0, 0x0) openat$cgroup_type(r7, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) r8 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ppoll(&(0x7f0000000000)=[{r8}, {r1, 0x301d}], 0x20000039, 0x0, 0x0, 0x0) 13:48:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000500) 13:48:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xff000000) [ 1133.031112][ T7495] new mount options do not match the existing superblock, will be ignored [ 1133.065528][ T7497] new mount options do not match the existing superblock, will be ignored [ 1133.102160][ T27] audit: type=1804 audit(1594734497.878:712): pid=7502 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1278/bus" dev="sda1" ino=16383 res=1 [ 1133.191650][ T27] audit: type=1804 audit(1594734497.878:713): pid=7502 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1278/bus" dev="sda1" ino=16383 res=1 [ 1133.216380][ T7503] new mount options do not match the existing superblock, will be ignored [ 1133.341259][ T27] audit: type=1804 audit(1594734497.878:714): pid=7502 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1278/bus" dev="sda1" ino=16383 res=1 [ 1133.381489][ T27] audit: type=1804 audit(1594734497.918:715): pid=7506 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1278/bus" dev="sda1" ino=16383 res=1 13:48:20 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000600) 13:48:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xfffffdfd) 13:48:20 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) r4 = dup(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r5}, {r4, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:20 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'vxcan0\x00', r0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'ip6gre0\x00', r2}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_usb_connect(0x3, 0x2c7, &(0x7f0000000500)={{0x12, 0x1, 0x250, 0xa7, 0x73, 0xb9, 0x40, 0x257a, 0x161f, 0x614f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2b5, 0x1, 0x7, 0x40, 0x40, 0x8, [{{0x9, 0x4, 0x5e, 0x2, 0x2, 0xb4, 0x9, 0x93, 0x7, [@hid_hid={0x9, 0x21, 0xf000, 0x8, 0x1, {0x22, 0x1d3}}, @cdc_ncm={{0x6, 0x24, 0x6, 0x0, 0x1, '6'}, {0x5, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x7fff, 0x20, 0x8, 0x8}, {0x6, 0x24, 0x1a, 0x1, 0x20}, [@mbim_extended={0x8, 0x24, 0x1c, 0x9, 0x1, 0x3}, @mdlm_detail={0x59, 0x24, 0x13, 0x3, "1ef69faa2213e8f3d5c1d96c8f88521869e5b1a994a17488f62cc72817f13874cb4ecbaf1cb8892d934d8167f8cd74bbaac5de1ad7241df26980c7e157f75660d6b6efde5d3e0aad6b62b07f55fe332260702c3237"}, @country_functional={0xc, 0x24, 0x7, 0x4, 0x8b, [0x4, 0x3f, 0x20]}, @mdlm_detail={0xfe, 0x24, 0x13, 0xff, "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"}, @network_terminal={0x7, 0x24, 0xa, 0x5, 0x3, 0x5, 0xe4}]}], [{{0x9, 0x5, 0x7, 0x10, 0x20, 0x69, 0x0, 0xc0, [@generic={0x65, 0xc, "43ba6a7df019f253da81c6a54c0d8d449c839d0429701866cd1152111a6a5b70e0c9fa25c2857cb76d9cc74e0eb3e200d9b0a4ba05bbaa4b490324357416ffaa2fdb324077ccadba5677239294d90cb073d901c45a73cbdd5a8e004ce6cf62a25e9c1a"}, @generic={0x1e, 0xd, "ed1b7f956f718debd8f132e8590d3c85420c192a67801593c8f9c4d9"}]}}, {{0x9, 0x5, 0x0, 0x10, 0x20, 0x80, 0x9, 0x0, [@generic={0x34, 0x2, "122f4269803a5cda0b574f8696cf7514b3473674747a8aee6431fcc77a087e236d2fdd44124a61cee82f87a109a910209862"}, @generic={0x41, 0x9, "6ce53673c9948fbce5c1cc4e6dfaf41fb9f6b8d89ec2f4faf2d948d512fd3c9e42e855602b52930297dbeffa89f2d9ac6d521cf1ad6e7dc332ea07bb2cfdad"}]}}]}}]}}]}}, &(0x7f0000000b80)={0xa, &(0x7f0000000200)={0xa, 0x6, 0x310, 0x40, 0x9, 0x80, 0x0, 0x5}, 0x12c, &(0x7f0000000c80)={0x5, 0xf, 0x12c, 0x5, [@wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0xd7, 0x0, 0x4, 0x8}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x9, 0x1, 0x7fff}, @generic={0xf6, 0x10, 0xa, "2786a29074ff3fa2e9c7d5e2098c292cd031c2d1180131948e8d15c1cfa7445a59285624ff18da612b7d04a21d7b6b2a1ed81a5563e6a5e73d2a4023fa6bc72c7c5ad4546e5b9351719b9894a638e4adaa18ec12c8253c9a0f95f2e8d58f592cd628372ad199ebddeb2d355263a6334fd4ccf8db400d7cd0ec2711f2ad7e8f81bb5c580e2a94371282e8a2a791c4317aa843584a289822893ba8c4db768dd69ac2de8f7b9f1d2895d917645b35e4cdcc392ad3b85732ba8281e26e6e81db7ef7719e5599f24c13462504200b0632537e880741ae0de9f5e21dbbc7bc8eb2f2412abcc3e6977454d2eee927c53ac4c3622c32e3"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "f39e606955e0de95dcb9c042aa3942bb"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x0, 0xc0, 0x1ff}]}, 0x6, [{0xe2, &(0x7f0000000800)=@string={0xe2, 0x3, "aa336be24f28bf4a32e828a8d9f4e5b1a2e87754fcb5999798fc561b00bdbcbf5e1c286e019375a0e0fe1edbe891a2886e3fa87286aca5422c71c404c778597a86484173662e72adcdb4a21a70d1ebbf5eff6fa26ff87c669924f24cb7b15c93a0aae79d9cb2f6def521df37a40b1d927f83aadee89911474ed0cf3df9f8d9c7be1272a9cb546e58c56a38cf99d46e818f4c8d4f22e425bfb4772112b975b017b0730efcda0b975f8a90747bc52210428be5cd4ea0f3adb292cdbd87c6465d82627645b8d62a44ecf21e6642100b8e4d3ffce0c8fdac0bc6059ffbe0204856a1"}}, {0xe7, &(0x7f00000002c0)=@string={0xe7, 0x3, "66377491a7eb10b99a21e2944c423a690f8ec8f9d7c94de33fa1bef35adb605ee5bbeec72d904bb05ae8a836457560773f0b8ae3fb61b9b86a860d384479eb533b58825e6edf5fa829e98df121ed40703228042ef6c0ee822decfbb0c564a78a600ed0bf3113e28033a27752a09da5590b15b0d80ed89c8537fe67193254ddfd034aee0232b899859b5f07ac8dbdafc3d94d0674e709b4c6fd37f3bab7ad7c77d477fc75842232e42d48ad94b7eeb2b748255a7fd65ce54d29552adde75bb8e35af6a8a8561fb2d6ebef585a09bd3795fc94d3084e6beb089cbcd3201a616c6bc98887c9f7"}}, {0x28, &(0x7f0000000240)=@string={0x28, 0x3, "96ac352f9cea91adc6cf618ce81d8f03ffec9595d21510f231cb26ab011273c6dfa8265df2e9"}}, {0x4, &(0x7f0000000a00)=@lang_id={0x4, 0x3, 0x1401}}, {0xff, &(0x7f0000000a40)=@string={0xff, 0x3, "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"}}, {0x4, &(0x7f0000000b40)=@lang_id={0x4, 0x3, 0x80a}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1135.685801][ T27] audit: type=1804 audit(1594734500.458:716): pid=7526 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 13:48:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000700) 13:48:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x4, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1135.770883][ T7532] new mount options do not match the existing superblock, will be ignored 13:48:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x100000000000000) [ 1135.839102][ T27] audit: type=1804 audit(1594734500.458:717): pid=7526 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 [ 1135.880491][ T27] audit: type=1804 audit(1594734500.458:718): pid=7526 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 13:48:20 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1135.943102][ T27] audit: type=1804 audit(1594734500.498:719): pid=7529 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 13:48:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x400ff00) [ 1136.046762][ T2581] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1136.063501][ T27] audit: type=1804 audit(1594734500.508:720): pid=7526 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 13:48:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x200000000000000) [ 1136.100036][ T27] audit: type=1804 audit(1594734500.508:721): pid=7529 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1279/bus" dev="sda1" ino=16342 res=1 13:48:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x5000000) [ 1136.217344][ T7550] new mount options do not match the existing superblock, will be ignored [ 1136.517117][ T2581] usb 1-1: config 7 has an invalid interface number: 94 but max is 0 [ 1136.525225][ T2581] usb 1-1: config 7 contains an unexpected descriptor of type 0x2, skipping [ 1136.534943][ T2581] usb 1-1: config 7 has no interface number 0 [ 1136.541611][ T2581] usb 1-1: config 7 interface 94 altsetting 2 has an invalid endpoint with address 0x0, skipping [ 1136.557396][ T2581] usb 1-1: config 7 interface 94 has no altsetting 0 [ 1136.716701][ T2581] usb 1-1: New USB device found, idVendor=257a, idProduct=161f, bcdDevice=61.4f [ 1136.725779][ T2581] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1136.736197][ T2581] usb 1-1: Product: 겖⼵궑쿆象ᷨΏ閕ᗒ쬱ꬦሁ왳꣟崦 [ 1136.745170][ T2581] usb 1-1: Manufacturer: 㝦酴뤐↚铢䉌椺踏杻짗ꄿ幠믥쟮逭끋㚨畅睠ି懻뢹虪㠍祄叫堻庂ꡟ灀⠲⸄샶苮냻擅誧๠뿐ጱ胢ꈳ剷鶠妥ᔋ薜︷ᥧ吲﷝䨃ˮ렲薙徛갇붍쎯䷙理১운㟽뫳궷睼矔痼⊄䠭钭랲╈罚峖䷥唩寧ꢨὖ횲婘봉锷铼࣓歎࣫벜⃓愚歬裉즇 [ 1136.778766][ T2581] usb 1-1: SerialNumber: ᐁ [ 1137.025560][ T7522] new mount options do not match the existing superblock, will be ignored [ 1137.177979][ T2581] option 1-1:7.94: GSM modem (1-port) converter detected [ 1137.190784][ T2581] usb 1-1: USB disconnect, device number 2 [ 1137.199811][ T2581] option 1-1:7.94: device disconnected [ 1137.620082][ T7530] new mount options do not match the existing superblock, will be ignored 13:48:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x6000000) 13:48:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x300000000000000) 13:48:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:23 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)=0x1) 13:48:23 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x11, @remote, 0x4e20, 0x0, 'sh\x00', 0x1, 0x13d4, 0x59}, {@loopback, 0x4e20, 0x3, 0x5, 0x0, 0x9}}, 0x44) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r4) r6 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x3, 0x400100) ppoll(&(0x7f0000000100)=[{r2, 0x4}, {r1, 0x701d}, {r3, 0x4108}, {r6, 0x4528}], 0x4, 0x0, 0x0, 0x0) 13:48:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x7000000) 13:48:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x400000000000000) [ 1138.875508][ T7599] new mount options do not match the existing superblock, will be ignored 13:48:23 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1138.939752][ T7597] new mount options do not match the existing superblock, will be ignored 13:48:23 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="05000000d05baeaaaa73659ff7a496faf4a4e66a000000000000010000000000000008410000000c00180000000069623a00"], 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}}, 0x2008) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1138.999933][ T27] audit: type=1804 audit(1594734503.779:722): pid=7606 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1282/bus" dev="sda1" ino=16356 res=1 [ 1139.123452][ T27] audit: type=1804 audit(1594734503.899:723): pid=7606 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1282/bus" dev="sda1" ino=16356 res=1 13:48:23 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="cc10040820100600ff02000000000000000000000000000100000000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffac1414aa000000000000000000000000000000002001000000000000000000000000000000000000001000"/136], 0x88) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x500000000000000) 13:48:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x8000000) [ 1139.346053][ T27] audit: type=1804 audit(1594734504.119:724): pid=7621 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1283/bus" dev="sda1" ino=16331 res=1 [ 1139.377248][ T7620] new mount options do not match the existing superblock, will be ignored 13:48:24 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000000)={r7, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x8) [ 1139.473697][ T7633] new mount options do not match the existing superblock, will be ignored [ 1139.495959][ T27] audit: type=1804 audit(1594734504.119:725): pid=7627 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1283/bus" dev="sda1" ino=16331 res=1 [ 1139.543726][ T7638] new mount options do not match the existing superblock, will be ignored [ 1139.601970][ T27] audit: type=1804 audit(1594734504.329:726): pid=7636 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1284/bus" dev="sda1" ino=16356 res=1 [ 1140.298844][ T27] audit: type=1804 audit(1594734505.079:727): pid=7639 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1284/bus" dev="sda1" ino=16356 res=1 13:48:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x600000000000000) 13:48:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0xe000000) 13:48:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:26 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:26 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000200)=0x200, 0x4) 13:48:26 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000100)=0xc) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:26 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x3de3) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x10000000) [ 1141.933690][ T7664] new mount options do not match the existing superblock, will be ignored 13:48:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x700000000000000) [ 1141.978462][ T7663] new mount options do not match the existing superblock, will be ignored 13:48:26 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:26 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1142.111988][ T7653] new mount options do not match the existing superblock, will be ignored 13:48:26 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000002c0)={{0x2f, @multicast1, 0x4698, 0x2, 'lblc\x00', 0x40, 0x3, 0x4a}, {@remote, 0x4e20, 0x2, 0x9c4b, 0x0, 0x401}}, 0x44) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:27 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 13:48:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x800000000000000) [ 1142.248026][ T7684] new mount options do not match the existing superblock, will be ignored [ 1142.464919][ T7686] new mount options do not match the existing superblock, will be ignored [ 1142.538080][ T7696] new mount options do not match the existing superblock, will be ignored 13:48:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x12000000) 13:48:29 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:29 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_usb_connect$cdc_ecm(0x3, 0x76, &(0x7f0000000140)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x64, 0x1, 0x1, 0x3f, 0x80, 0x8, [{{0x9, 0x4, 0x0, 0x20, 0x3, 0x2, 0x6, 0x0, 0x9, {{0x6, 0x24, 0x6, 0x0, 0x0, '0'}, {0x5, 0x24, 0x0, 0xd4}, {0xd, 0x24, 0xf, 0x1, 0x9, 0x2, 0xff01, 0x5}, [@dmm={0x7, 0x24, 0x14, 0x0, 0x1}, @mbim_extended={0x8, 0x24, 0x1c, 0xf801, 0x20, 0x3}, @acm={0x4, 0x24, 0x2, 0x8}, @mbim={0xc, 0x24, 0x1b, 0x101, 0x0, 0x80, 0x5, 0x6, 0x7}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x400, 0x1, 0x5, 0x9}}], {{0x9, 0x5, 0x82, 0x2, 0x400, 0x2, 0x7f, 0x81}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x6, 0x9, 0x1}}}}}]}}]}}, &(0x7f0000000600)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x110, 0x80, 0x7, 0x0, 0x40, 0x9}, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="050000"], 0x8, [{0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0xc07}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x404}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x437}}, {0xfa, &(0x7f0000000800)=ANY=[@ANYRES16]}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x406}}, {0x9a, &(0x7f0000000480)=@string={0x9a, 0x3, "a371448d4cfd9b2ef36f96b3cf2b5bbe3d8c82734a64d7f75f7ad48910d82393b20f4f2c54ed120edc6f8b25b2c92e8e628da9c8f77d98b0eb059e66aa9de702fccc66468d494253a3a930c8ddfe12ac69968cfddb96792142a574ca3c891fd82a603a07ab76a057cf1f35c0779ade67a852d39034f1bbf5846980bb23f34994d3186184810a53227afe98c3d270143cc2383169c7ac02a6"}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x438}}, {0x57, &(0x7f0000000580)=@string={0x57, 0x3, "61b6c5772f696e1b332f2a07d392e2c3a15d7768503a6d4b752009dfadafca66a43ccb6b14cb44dfd6ee8735219286fae2ab61af1d666d6cd50ae6549aea64b629f9df7e63da9d371fe1a7df456ea35c7e06ffc7d9"}}]}) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x8001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, '\x00', "2b0271cb0400", '\x00', "641a59c4449fc55d"}, 0x28) bind(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4, {0xa, 0x4e23, 0x6, @empty, 0xc}}}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0xa, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="4000000100002d0b000000fb9433790000000000", @ANYRES32=r3, @ANYBLOB="00000000fffffffff152675e0fd202ab667500001400020008000300c50000e00800020000000000"], 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000680)={'vxcan1\x00', r3}) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) ioctl$HIDIOCGPHYS(r6, 0x80404812, &(0x7f00000000c0)) 13:48:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x3f00000000000000) 13:48:29 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000940)={&(0x7f00000007c0)={0x178, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) [ 1145.033980][ T7718] new mount options do not match the existing superblock, will be ignored [ 1145.063486][ T7710] new mount options do not match the existing superblock, will be ignored 13:48:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0xff000000) 13:48:29 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xfdfdffff00000000) 13:48:30 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1145.225750][ T2589] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 1145.247410][ T7710] new mount options do not match the existing superblock, will be ignored 13:48:30 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:30 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1], 0x1) dup3(r1, r0, 0x0) finit_module(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000000)={0x1, "c1852b7450da6aab83334e6f5a87dcc08c518d5d27a3cd7c6f47e10c352205046bb57c0fefee33916beaf8df3cb8f4c3e87b5acfc2f292ab9ac164782ab61541", {0xf0}}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:30 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xff00000000000000) [ 1145.408586][ T7732] new mount options do not match the existing superblock, will be ignored [ 1145.530497][ T27] audit: type=1804 audit(1594734510.309:728): pid=7742 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1268/bus" dev="sda1" ino=16375 res=1 [ 1145.569944][ T7743] new mount options do not match the existing superblock, will be ignored [ 1145.643013][ T27] audit: type=1804 audit(1594734510.379:729): pid=7742 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1268/bus" dev="sda1" ino=16375 res=1 [ 1145.646140][ T2589] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1145.699857][ T7740] new mount options do not match the existing superblock, will be ignored [ 1145.836329][ T2589] usb 2-1: config 1 interface 0 altsetting 32 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1145.856759][ T2589] usb 2-1: config 1 interface 0 altsetting 32 bulk endpoint 0x3 has invalid maxpacket 1023 [ 1145.880261][ T2589] usb 2-1: config 1 interface 0 has no altsetting 0 [ 1146.245924][ T2589] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1146.254972][ T2589] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1146.264264][ T2589] usb 2-1: Product: з [ 1146.269021][ T2589] usb 2-1: Manufacturer: Є [ 1146.287458][ T7707] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1146.295029][ T7707] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1146.580585][ T27] audit: type=1804 audit(1594734511.359:730): pid=7756 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1289/bus" dev="sda1" ino=16384 res=1 13:48:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:32 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000000)={0xf0, &(0x7f0000000140)=""/240}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x98b80, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000140)={[], 0xffff, 0x4, 0x20, 0x0, 0xd1f, 0xd000, 0x6000, [], 0x8001}) 13:48:32 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socket$isdn(0x22, 0x3, 0x10) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x43) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000500)={'syz0\x00', {0xd131, 0x7, 0x1, 0x4}, 0x3, [0x400, 0x6, 0x3, 0x5521, 0x1, 0x1, 0xb88, 0x900, 0x8, 0xbb, 0x40, 0xc4, 0xad, 0x27, 0x1000, 0x4, 0xca, 0x3, 0x2, 0x9, 0x4, 0x20, 0x2, 0xbb8, 0x3, 0x9, 0x3, 0xfffff001, 0x66, 0x8, 0x8001, 0x8a6, 0x80000001, 0x1, 0x3, 0x306a, 0x4, 0x101, 0x6, 0x10000, 0x3, 0x7f, 0x6, 0xad65, 0xa2, 0x9, 0x60, 0x5, 0x5, 0x8, 0x10000, 0x100, 0x8, 0x4, 0xffffffff, 0x5, 0x4, 0x8d, 0x3, 0x3, 0x1, 0x7f, 0x2, 0x7e2e], [0x59, 0x21f, 0x6, 0x5, 0x1ff, 0x8000, 0x95, 0x1, 0x18000, 0x6, 0x6, 0x1, 0x1c, 0x4, 0xffffff97, 0x7, 0x8, 0x80, 0x9, 0xa7, 0x5, 0x0, 0x4, 0x10000, 0x3, 0x16c2, 0xfffffffd, 0x5, 0xffff8000, 0x7, 0x7fffffff, 0x7, 0x2, 0x5, 0x5, 0x8000, 0x400, 0x7, 0xffffffff, 0x9, 0x2, 0x7f, 0x3, 0x10001, 0x1, 0xffffffe0, 0x6, 0x100, 0x38c, 0xc9, 0x9, 0x9, 0xffffffff, 0x3, 0xff, 0x101, 0xfffffff8, 0xfffffff8, 0x8, 0x8, 0x80, 0x8, 0x7f, 0x8], [0x9, 0x400, 0x7, 0x6, 0xaec, 0x1, 0x5, 0x4, 0xfffffff8, 0x65ff, 0x7fff, 0x8, 0x40, 0x100, 0x3f, 0x20613b42, 0x26f, 0x2, 0x314a9a34, 0x7, 0x1ff, 0x200, 0x8001, 0x200, 0xf0a1, 0x45, 0x4, 0x3ff, 0x4, 0x5, 0xf3d, 0xffffffff, 0x7, 0x1, 0x4, 0xf5a4, 0x120, 0x1, 0xbb, 0x7, 0xf4, 0x1ff, 0x0, 0x7, 0x1, 0x8000, 0x4, 0x5, 0x8004, 0x7, 0x2, 0x6, 0xff, 0x11, 0x7ff, 0x10001, 0x80000000, 0x400, 0x7, 0x40, 0xffff, 0x6, 0x0, 0x28000], [0x421131b8, 0x1, 0x40, 0x7fffffff, 0x10, 0x5, 0xff, 0x7, 0x101, 0x39f6, 0x8, 0x7fffffff, 0x9, 0xffff, 0x1, 0xfd, 0xfffffff9, 0x20, 0x2, 0xff, 0x800, 0x5, 0x400, 0x0, 0x2, 0x18, 0x3, 0x400, 0x8, 0x4e, 0xfffffff9, 0x0, 0xa1, 0x0, 0x8, 0x0, 0x8, 0x10000, 0x2, 0x5, 0xe3e, 0x1, 0x5, 0x2, 0x2, 0xeaf4, 0x6, 0x8, 0xff, 0xb9, 0x2, 0x9, 0x8, 0xffffffff, 0x3, 0x3d, 0x0, 0x3a9, 0x9, 0x9, 0x9, 0x4, 0x5, 0x7]}, 0x45c) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000200)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) readlinkat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)=""/4096, 0x1000) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r3}, {r2, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1148.036040][ T2589] cdc_ether: probe of 2-1:1.0 failed with error -71 [ 1148.088346][ T2589] usb 2-1: USB disconnect, device number 2 [ 1148.112255][ T7778] new mount options do not match the existing superblock, will be ignored [ 1148.121493][ T27] audit: type=1804 audit(1594734512.899:731): pid=7774 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1269/bus" dev="sda1" ino=16342 res=1 [ 1148.160876][ T7764] new mount options do not match the existing superblock, will be ignored 13:48:33 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1148.238741][ T27] audit: type=1804 audit(1594734512.910:732): pid=7779 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1654/bus" dev="sda1" ino=16340 res=1 [ 1148.272135][ T7790] new mount options do not match the existing superblock, will be ignored 13:48:33 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x101}, 0x4) 13:48:33 executing program 4: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ptrace$poke(0x4, r0, &(0x7f0000000000), 0x8) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x4000000) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1148.379683][ T27] audit: type=1804 audit(1594734512.960:733): pid=7775 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1386/bus" dev="sda1" ino=16339 res=1 13:48:33 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) finit_module(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000340)=0x4) dup3(r3, r2, 0x0) getpeername(r2, &(0x7f0000000200)=@phonet, &(0x7f00000002c0)=0x80) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x2) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x8000, 0x58) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$VIDIOC_S_FBUF(r4, 0x4030560b, &(0x7f0000000000)={0x40, 0x60, &(0x7f0000000140)="0bea6eb73161a506ecc70f3fec4ff9ed548c6f1644eab52673f3ec1b694879296d5064e211128bb03138449df428856e682717e16913893ce717c65615191a7429bcfbf326dc642b0fd9383d2247b7b7af14775d5723ed43a18a3c9cb91945a61184f4bdf4c095cd87fdac11c4a6835ae15950d03b34ce8cc5417bf5b37bf73586547499365259b3263bb93f4c7abb7ed20f246e6cb8dd38de248b29f93583195ee672ced2e6fecaf3513afa7647fb6fe1d5cf852b19185563a3d560771ca1d920d229a3ced93d39a5acf578055fdae9e79b585ea56e2cecc259b4ee45e2aca1e9", {0x2, 0x7, 0x30314442, 0x2, 0xff, 0x2, 0x0, 0xfff}}) [ 1148.537219][ T27] audit: type=1804 audit(1594734512.990:734): pid=7781 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1269/bus" dev="sda1" ino=16342 res=1 [ 1148.568721][ T7797] new mount options do not match the existing superblock, will be ignored 13:48:33 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1148.681992][ T27] audit: type=1804 audit(1594734513.130:735): pid=7764 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1386/bus" dev="sda1" ino=16339 res=1 [ 1148.708964][ T7804] new mount options do not match the existing superblock, will be ignored [ 1148.806535][ T7804] new mount options do not match the existing superblock, will be ignored [ 1148.839294][ T27] audit: type=1804 audit(1594734513.320:736): pid=7800 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1655/bus" dev="sda1" ino=16342 res=1 [ 1148.931509][ T7819] new mount options do not match the existing superblock, will be ignored [ 1148.951489][ T27] audit: type=1804 audit(1594734513.390:737): pid=7803 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1655/bus" dev="sda1" ino=16342 res=1 13:48:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:35 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x0, 0x1, 0x8}}, 0x14) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x8008af26, &(0x7f0000000100)) 13:48:35 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1ff, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="87da1a62eff99163d05c10aa01fc60d95df19a8ea23d2675d20d7b053406a75f7bc81df32194c03e1569bab6b6ceee14167ed0684cc529190a92675b75be158aec087d1e304205d5f6c6e511789f1d676468f5de3ec93261f7b71b692f06d690ce0284d63118a7ee6b009622217113b272ee6ee85a7a58b4", 0x78, 0xfff}], 0x20020, &(0x7f0000000400)={[{@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@gid={'gid'}}, {@utf8='utf8'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_recover='errors=recover'}], [{@smackfshat={'smackfshat', 0x3d, '@{/+/+'}}, {@euid_gt={'euid>'}}, {@hash='hash'}]}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x24}, 0x3, 0x2, 0x74fc, 0x9, r2, r5, 0x2}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r6, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f00000000c0)=[{r6}, {r1, 0x301d}], 0x1ffffed6, 0x0, 0x0, 0x0) 13:48:35 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x8000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r2, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x2}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x8f, 0xac, "51b0f09c5fc6c132b22dabddfc059f306ee7daa7b4c3fbba5e9571329a0a854758f786e278511c5ca92a10b2cc0819813d3935c1c349ef3448518fdaa03dbb8eb178bd310b59c5d4b849f91810e852d148219259986d12cb61d0a72ec9231218ccb7b8571428a541dfef556dfee54ca19b8288e0982c4c479b2dc15f7d47d24fd6baed6d4d83856d4ad6cf"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xc3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0xffffffffffffffff}}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x2eb}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x48000) 13:48:35 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x50}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x244040, 0x0) 13:48:35 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1151.098164][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 1151.098177][ T27] audit: type=1804 audit(1594734515.880:745): pid=7826 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 13:48:36 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000180)=@gcm_256={{0x303}, "65dac42989d90154", "1a6db974d0916ec3f00a42176c1629b9aaf81c342f7d4d4a761e0818e0d8756f", "4a7e86de", "2b4e40d6e26eb7bc"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r5 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x8, 0x800) ioctl$HIDIOCGVERSION(r5, 0x80044801, &(0x7f0000000100)) 13:48:36 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000240)={0x2, @pix={0x7, 0x7ff, 0x42474752, 0x3, 0x2, 0x8001, 0x0, 0x9, 0x0, 0x7, 0x0, 0x4}}) [ 1151.232617][ T7828] new mount options do not match the existing superblock, will be ignored [ 1151.270074][ T7840] new mount options do not match the existing superblock, will be ignored [ 1151.274030][ T27] audit: type=1804 audit(1594734515.880:746): pid=7826 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 13:48:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) wait4(r5, &(0x7f0000000300), 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x8c, r4, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2a1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xeb5c}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8800}, 0x80) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000002c0)=0x7f66cfed) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x1, 0x0) 13:48:36 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x0, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1151.384589][ T7830] new mount options do not match the existing superblock, will be ignored [ 1151.454673][ T27] audit: type=1804 audit(1594734515.880:747): pid=7826 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 [ 1151.531862][ T7852] IPVS: Error connecting to the multicast addr 13:48:36 executing program 0: listen(0xffffffffffffffff, 0x20000003) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB='cx~)\x00\x00<'], 0x14}}, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r2, 0x20, 0x70bd29, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x3c}}, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:36 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0xcc) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000000)={0x9, "b900705a6417c0906ed80ad7d0f7f8a99c0dc0958be07fd57d91cc9dd37be9ff", 0x3}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) [ 1151.636350][ T27] audit: type=1804 audit(1594734515.940:748): pid=7826 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 [ 1151.671004][ T7855] new mount options do not match the existing superblock, will be ignored [ 1151.720703][ T27] audit: type=1804 audit(1594734515.950:749): pid=7836 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 [ 1151.820319][ T27] audit: type=1804 audit(1594734515.960:750): pid=7826 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1656/bus" dev="sda1" ino=16340 res=1 [ 1151.924755][ T27] audit: type=1804 audit(1594734516.180:751): pid=7847 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1292/bus" dev="sda1" ino=16367 res=1 [ 1151.931016][ T7868] new mount options do not match the existing superblock, will be ignored [ 1151.997409][ T27] audit: type=1804 audit(1594734516.200:752): pid=7847 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1292/bus" dev="sda1" ino=16367 res=1 [ 1152.084999][ T27] audit: type=1804 audit(1594734516.270:753): pid=7851 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1657/bus" dev="sda1" ino=16382 res=1 [ 1152.137299][ T27] audit: type=1804 audit(1594734516.300:754): pid=7852 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1273/bus" dev="sda1" ino=16380 res=1 13:48:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:38 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x840, 0x10) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000000), 0x4) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:38 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, 0xffffffffffffffff, 0x0) finit_module(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) accept4$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14, 0x80800) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xa4, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x800}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:38 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x0, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:38 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000240)=0x1) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:38 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0xffffff99, 0x4) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r3, 0x80045301, &(0x7f0000000140)) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f0000000000)={[0x4, 0x0, 0x1000, 0x5000], 0x1, 0x20}) [ 1154.271735][ T7877] new mount options do not match the existing superblock, will be ignored [ 1154.311360][ T7881] new mount options do not match the existing superblock, will be ignored 13:48:39 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x0, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1154.427671][ T7885] new mount options do not match the existing superblock, will be ignored 13:48:39 executing program 4: ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000000)={0x101, 0x8, [0x24, 0x4]}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x8000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) r3 = dup(r1) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000000408010200eacc8c5163fe995ee48e227000000000000000c318fa247a8f563e0800044000000ea008000340800000010800084000000006080005400000000608000240"], 0x48}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000) 13:48:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000040)) [ 1154.658052][ T7898] new mount options do not match the existing superblock, will be ignored 13:48:39 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) read$fb(0xffffffffffffffff, &(0x7f0000000000)=""/149, 0x95) 13:48:39 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1ff, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="87da1a62eff99163d05c10aa01fc60d95df19a8ea23d2675d20d7b053406a75f7bc81df32194c03e1569bab6b6ceee14167ed0684cc529190a92675b75be158aec087d1e304205d5f6c6e511789f1d676468f5de3ec93261f7b71b692f06d690ce0284d63118a7ee6b009622217113b272ee6ee85a7a58b4", 0x78, 0xfff}], 0x20020, &(0x7f0000000400)={[{@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@gid={'gid', 0x3d, r1}}, {@utf8='utf8'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_recover='errors=recover'}], [{@smackfshat={'smackfshat', 0x3d, '@{/+/+'}}, {@euid_gt={'euid>', r2}}, {@hash='hash'}]}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000200)={0x78, 0x0, 0x6, {0x73, 0x8, 0x0, {0x6, 0x8e, 0x7, 0x7, 0x5, 0x6, 0xfff, 0x400, 0x5, 0xfffff03a, 0x40000000, 0x0, r1, 0x20}}}, 0x78) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:39 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1154.914087][ T7913] new mount options do not match the existing superblock, will be ignored [ 1155.037448][ T7919] new mount options do not match the existing superblock, will be ignored [ 1155.075657][ T7922] new mount options do not match the existing superblock, will be ignored 13:48:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(r2, r1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x38, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x38}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x3}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x2}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x5}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8}, @ETHTOOL_A_CHANNELS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xa199}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x9f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) finit_module(r2, 0x0, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/134}) 13:48:42 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x100002, &(0x7f0000000300)=ANY=[@ANYBLOB="7272616e733d756e69782c6a6f6465766d61702c63616368657461673d6370757365742e6d656d6f72795f7370726561645f736c6162002c63616368657461673ddb212c00"]) 13:48:42 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r5, 0x40106436, &(0x7f0000000100)={0x0, 0x8}) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1157.341725][ T27] kauditd_printk_skb: 19 callbacks suppressed [ 1157.341739][ T27] audit: type=1804 audit(1594734522.120:774): pid=7934 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1294/bus" dev="sda1" ino=16342 res=1 [ 1157.420825][ T7945] new mount options do not match the existing superblock, will be ignored 13:48:42 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x4000000) [ 1157.463409][ T7935] new mount options do not match the existing superblock, will be ignored [ 1157.483705][ T27] audit: type=1804 audit(1594734522.170:775): pid=7936 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1662/bus" dev="sda1" ino=16339 res=1 [ 1157.526397][ T27] audit: type=1804 audit(1594734522.210:776): pid=7934 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1294/bus" dev="sda1" ino=16342 res=1 [ 1157.561180][ T7949] new mount options do not match the existing superblock, will be ignored 13:48:42 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0xffe1, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:42 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus/file0\x00', 0x880, 0x1b1) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x8008af26, &(0x7f0000000100)=0x200000000) [ 1157.640870][ T27] audit: type=1804 audit(1594734522.311:777): pid=7936 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1662/bus" dev="sda1" ino=16339 res=1 13:48:42 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) r3 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1157.790435][ T27] audit: type=1804 audit(1594734522.521:778): pid=7956 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1295/bus" dev="sda1" ino=16328 res=1 13:48:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) socket$inet(0x2, 0xa, 0x7a) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000180)=0x4) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='maps\x00') getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) [ 1157.920469][ T7964] new mount options do not match the existing superblock, will be ignored 13:48:42 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x19c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1157.960451][ T27] audit: type=1804 audit(1594734522.741:779): pid=7964 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1393/bus" dev="sda1" ino=16367 res=1 [ 1158.019163][ T7972] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) [ 1158.070722][ T7964] new mount options do not match the existing superblock, will be ignored [ 1158.082886][ T27] audit: type=1804 audit(1594734522.861:780): pid=7966 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1393/bus" dev="sda1" ino=16367 res=1 [ 1158.138987][ T7976] new mount options do not match the existing superblock, will be ignored [ 1158.440683][ T27] audit: type=1804 audit(1594734523.221:781): pid=7980 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1295/bus" dev="sda1" ino=16328 res=1 [ 1158.465560][ T27] audit: type=1804 audit(1594734523.221:782): pid=7960 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1295/bus" dev="sda1" ino=16328 res=1 13:48:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:45 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @dev}, &(0x7f0000000200)=0xc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) io_cancel(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x3, 0xffffffffffffffff, &(0x7f0000000240)="93de5d9b5089da49714875df109988d395b7326e548c44cdd6f9222621778ea83d19591169fe8e4d9c082ee967e072bd4af1252e60e8d11c65289330d5e5de89f7144328be65908ab9df479563f4fa49d85a0711c7dc4ac68e410dd1f8116306c4bc89d191c7981081af5e84f6a827f7f5031cf2af6adb1c25bb4a4d31d8", 0x7e, 0x45e, 0x0, 0x1}, &(0x7f0000000180)) finit_module(r4, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@rc={0x1f, @none, 0x8}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000024005cd516b38486cf6701feba3c14f1eea4e1866f1d000000000000000000", @ANYRES32=r7, @ANYBLOB="20000020ffffffff0000000007000100667100001400020008e30200c50000000800020000000000"], 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xc8, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x4}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4008040}, 0x44001) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r9, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:45 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = dup3(r1, r0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000000)=0x1000000) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x141000, 0x0) sendto$netrom(r5, &(0x7f0000000140)="31e10eb005e3ae89b1e0e781f3ced6a4c424ce46518ddac1209000b6471cd50a0a5e7abd02d364d16dad76c33a59f812ff55dc4f9484c3994b734d3a74cb1a3d2e61a03fa3ac921630a5690c4e7918d44cc5bdfbae54c260ece54551f9d1ae61705a29e8c901787db7c673c4cb06877b36fa1dc5c257318356806d7d3a35d0b2726ff18e9184adc0b8057e241eec5bd6416488efe758823150a805410e8b9fe96beae4ad79ac02305b1044be47491b7b7bb7caed969c62129f2830b50c99273749156dceb6ffca71b0a8ccb25553e80a114457ec377c2d", 0xd7, 0x20000000, &(0x7f0000000240)={{0x3, @null, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}, 0x48) 13:48:45 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000380)=0x6, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, 0x0, 0x20040090) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000002c0)=""/180, &(0x7f0000000200)=0xb4) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:45 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x19c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:45 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "be6d1cdd669b4ac5", "0eb760f0ab57d9280ef4091cff9a6c73", '\x00', "6af800"}, 0x28) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1160.421550][ T27] audit: type=1804 audit(1594734525.201:783): pid=7987 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1278/bus" dev="sda1" ino=16340 res=1 [ 1160.481654][ T7989] new mount options do not match the existing superblock, will be ignored 13:48:45 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x1, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1160.528561][ T7990] new mount options do not match the existing superblock, will be ignored 13:48:45 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x19c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1160.638740][ T7999] new mount options do not match the existing superblock, will be ignored 13:48:45 executing program 5: prctl$PR_SET_FPEMU(0xa, 0x2) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x7fe00000000000, 0x101, 0x1f}, 0x2}, 0x20, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001500)=@newqdisc={0x178, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_TIMER_SLACK={0x8, 0xd, 0x10000}]}}, @TCA_STAB={0x138, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x8, 0x7, 0x3ff, 0x5, 0x1, 0x1, 0xffff, 0x5}}, {0xe, 0x2, [0x9, 0xfff7, 0x0, 0x8, 0x6]}}, {{0x1c, 0x1, {0x4, 0xf, 0x4, 0x2, 0x2, 0x7c, 0xfff, 0x1}}, {0x6, 0x2, [0xb02b]}}, {{0x1c, 0x1, {0x8, 0x4, 0xe55, 0xf022, 0x2, 0x1ff, 0x5, 0x4}}, {0xc, 0x2, [0x8, 0x4, 0xb9ed, 0x8000]}}, {{0x1c, 0x1, {0x6, 0x6, 0xa0f5, 0x6, 0x2, 0x7, 0x115d1e01, 0x7}}, {0x12, 0x2, [0x4, 0x9, 0x3f, 0x2, 0x3, 0x81, 0x20]}}, {{0x1c, 0x1, {0x2, 0x6, 0x7, 0x8, 0x0, 0x30a, 0x3, 0x5}}, {0xe, 0x2, [0x7, 0x7fff, 0x2, 0x3f, 0x81]}}, {{0x1c, 0x1, {0x6, 0x1f, 0x7, 0x400, 0x2, 0xb361, 0x7f, 0xa}}, {0x18, 0x2, [0x2, 0x3, 0x7, 0x9, 0x4, 0x1, 0x5, 0x6, 0x6, 0x0]}}, {{0x1c, 0x1, {0x0, 0x20, 0x0, 0xcb, 0x0, 0x9, 0x8, 0x5}}, {0xe, 0x2, [0xce5, 0x800, 0x2, 0x7, 0x8]}}]}]}, 0x178}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001480)={&(0x7f0000000140)={0x1338, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x1130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xde, 0x4, "3340922c8737ca9026e43340f58abf30c1c59a5533816b4b26fb365c786870354cb5515f95802c99ad943d03bc7e23a5f9a4a466d35d5ee5d8e02f308812544ceade7189387a31fae6cbf0d3039e4f7432a96567c55052791409927f8b648c612e686eb00c4fd5fab728e205c28a4f7494733f165d21558f9c0d0a3870d6dddcb4ffae753b4a0538578640b8bf47888c4fa82ae220e6b00fbbc15787f7dd6198708d32cd9ca583ba83006655001b3582207dfaaeeaa7e8edcc14ff8420cb7ca283e6c5f6352d570f209a2f88602ef5550c273b74d94206292f45"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x400}, @ETHTOOL_A_BITSET_BITS={0x2c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/vhost-net\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8001}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_DEBUG_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x144, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8f, 0x4, "a8b68094d538617a95ba799a461dc7d15d5e18bb718f2a9e2adad2a6ad2b8c308842c40ab938acbf1d7cd38e8ecb57e756bff9e6e97a0a31c298e63e64a02c6afcdad43c9a66ae198c25b3a90d4c9e1523c0029cf678bf2f457174471a0c471dfd1ec5baad53e0cab14d10559802bd8948a518dd87a64ac4711b07a323159149b4b2c9cb69179c40422353"}, @ETHTOOL_A_BITSET_VALUE={0xaa, 0x4, "d239067b0de8121adf71350acc938544def3aedb32d8427baeadda7bc6b98a0fa48f39416a74efe01cd8cc85f681a76381623607f39b540f1ae854c1a4fb32c9d6f98ebb1f33cc89db53435bfb92738ec369289dce3f779a8bc884b2e0c737b8dc25990a61fec603fae74cb8c8b088495bc3394115c04935db1bcd53ae69588a3193221052a83d2e169844ffdf64893787ba053c643e53385ee156c5a89090739a6a7e8652a2"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1338}, 0x1, 0x0, 0x0, 0x20008851}, 0x8000) 13:48:45 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000020000000000090000003c0003800800010001000000140002007663616e300000000000000000000000080003000000000014000600ff02000000000000d1ce00000000000040248778be40405efa872c1fb831a11e9898147c93f52a19dc99755868cb82177df0daf8522c53cc1e59c49a399725af50dc2484f97f386ccf17c253c6af8bf4831361e563b0d24919e542b2cb38ec6ee3f264c2275e714feca4d9ef62b4260d90"], 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r2, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:45 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20000, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x58, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x1, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x1000}) ppoll(&(0x7f0000000000)=[{r3}, {r2, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000002800)={'syztnl2\x00', &(0x7f0000002780)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x20, 0x6, 0x4, @private1={0xfc, 0x1, [], 0x1}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10, 0x10, 0x2, 0x3}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r4 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003580)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000240)="b2e7e4e00636e914c99fb9c898b7f307d18190143a78d1864d91859dbaea53fe60394e20f2c00465b25af293ac067016f0bd2f3ebc52082f72c81501d33e2e09c5fd873b76012ff511a366dacb90e65fd0fd0ba17f0e1422743e0da532b2e5a27a1f826318f25b96b16f0de72cb96019423e06dc4f10034609c47f95d386daf2e7bf57e892385e3acaacddcc7239a0559d3c3c91259fe516ce07f570753995dce7b594673b26c47efde057c5276121a48199124b0e028c6961f8cc985aa8898270092c3eed5c3a3fe089c2df", 0xcc}, {&(0x7f0000000600)="299cb5", 0x3}, {&(0x7f0000000340)="3538cabb1a921373d50c17e4d5b1d39220fcf6876523bfa0ad33a5f362af45a582ef8860471aab5ba6d34930167391a6cc07b62cbfc32cc16277ae5a3cae686748da36186058023fbea06edfa53ecb21acaa8a67daf66e9c9ab7026f6705bd53ca04a9ef6cd33e4a986cccb2a759d71c454fba14b78e579b9389d5778bb942a8c95b1de804c747249bc067a63a0f383c0b2cf3e45abff94dbc9b7d6f48d08e7409845a5b0dfebbcf0308cd01a22c78bd9e49355bc99fdce1ce01809eae9033a8f8a9d3f792ff8e2f80ccaa714bd86ad3", 0xd0}], 0x3, &(0x7f0000002880)=[@ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x82, 0xf, "5745b13726ac07ad2dd701111e"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x23}, @private=0xa010102}}}, @ip_tos_int={{0x14}}], 0x88}}, {{&(0x7f0000000640)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000002700)=[{&(0x7f0000000680)="609439e177d0ae9a48a27c3e5278b84521b8d4cf649f999cd81135cea7c5c3598d83207f1e00c261c0f1919f318667de10a0f01877e4e4004374f3e46cfdfc235943e35d1dcdf99de481adc34b0b295cabf41e02cd392c2bf243cdee9a73f3ade69ea236833718e3ad8d866a9056acbc5227c8255dd69033da", 0x79}, {&(0x7f0000003800)="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", 0x1000}, {&(0x7f0000001700)="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", 0x1000}], 0x3, &(0x7f0000000900)}}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002840)="e0842859693a127031abfa608d6fbfbbb7ea702307003f6b484ffbd94f9a0a440d7c409aefc7c60435b5", 0x2a}, {&(0x7f0000002740)="891aff9b5e", 0x5}, {&(0x7f0000002980)="630848fb8c181119ba1795c6b3c7d2f7653843f3c115d199c0a074e1059329174683410d6530db41df7e672226af65042f41a54c1c045a109e146c8bd55191502643a23dd0b7fe7cce579c4768cad67022e26c16", 0x54}, {&(0x7f0000002a00)="2c7246b7ea576db2b50befcaad00000000000000", 0x14}, {&(0x7f0000002a40)="a276cd934b252d450624a2f614a09c9dc9e683d38fd2769132be190db288510be3dce21e72501173fc74bf90408b6bbae9a8a5c0555525434fafd86790c361c5e81685eb167c4687543b390b1a4029366ff7aae95ceb7cab4d92b6882949c4be553de4cf0065693bc5a291698e3cb5e0653c4591fe7a7550897cbf2c2a8f3217698333612797", 0x86}], 0x5}}, {{&(0x7f0000002b80)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000002cc0)=[{&(0x7f0000002bc0)="b0209f3b0db737a4d2aee0ba5c50213883859f9d9ea5fb07e25f8032063c87486aef960d149cb1f2f271ce4ae5fb9e741f4f3bb57c35f55e55e6b862dcd02680cd10f04342870d93e30739059b6d8abf8e49d5d1dc992778763caa15f9019a31fad1ea4cc88678171705aada40f57fe747558f3201d0a3d7f9980942b0fc9f6d8b2c777ac92ede45623c2a9850901fa7c4239355d8318993c7c85b10e98cfa4f7071883fcea42c3d42217a088f78f5366495ba4a158728fd76cf0ca6bda581359363f738b140bea0d391dc", 0xcb}], 0x1, &(0x7f0000002d00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}], 0x30}}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002d40)="783f2d105c8dd5d862442fd1bffbc6553aaf8624e350135cbceb4724e55478f18af1b06ff5fbb2698ba64c58651098f2be6803131331e25c6c2a945c3da61953ec81888efbe10e3b4225e06d86563d58903f78baca9bab227c361b4cdb095d552c4a6e80dd44d181be0f5df045b12a30332fc8c89c09545b422428aaba01d793d2c303820beaa2755ac8ec58413e3f10471d7207361b270966f67e3a2b59404424c08c9371938c126fb744846d5ad30022e310c8fc2e7946fd35e1a9a5f56ec0b20114db3ccb77052515b2cda578d22b2d67", 0xd2}], 0x1, &(0x7f0000002e80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0x64010101, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x38}}, {{&(0x7f0000002ec0)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000700)=[{&(0x7f0000002f00)="97eb6493a6c85f2523be764cfe82ba1c51cb7a83e3242fd62d0a024bcabd239ec1b339587c02140ef7151cc8cbeb4cf4df0f858bc60758b4b5eb5abc97aecc126e44540d825d2781ded5c4aeb166ff8d86d5b1e7b56fe83936d4206d3f829c9bffa1996eaf0d065564a82e7a0b7e6777e8cf8d1005a7bc3da4d45cdfcdc1eaccca229669adb817ac064c3cff4c57b8819ac1a0", 0x93}, {&(0x7f0000002fc0)="5d691c97e7e428e05cfdddf9d18e2374c10c7218dfe3220211c97a2e5f186718fbbc3f898376f9cfaff2cbe977a885348dcb5048f694b719486261330b8cff7c278c08dc581de912906fba2fc21a71c2b48d846918c0928f97bb42e83182bc628cae3b357b5954b2e0dbfc6f8ba21055287334cea5fe19ba476bb91f27654098523ed74301baae9c35a82b40d441cb4f57d75f906ad9097cdcb08721709860d6", 0xa0}, {&(0x7f0000003080)="ce309c3e819c1ea370", 0x9}, {&(0x7f00000030c0)="809cff994f969e309e89ef4ab8fccd94c133ed74edbaf620daed6485ab68ee23d13331c61b9b20e25b1cddebe1e990d696846ae80a1071da8e77c3e9288f66524f71fc73e834d38884ac14b88f8d9c73aa22f4b8eb5cd9d22d03d2bbcfa2522a9f1a1f0da0e723497f7177fda6b7aa6516c287703e8b169d167475a5cc82fbd3c2fb9071bc245d3b9c7a457b11d91f2f", 0x90}, {&(0x7f0000003180)="fdeba642326193258c95360d837345dceb02a5a4143dc2332039e21a9f34551a25a64269040d8885e45ee8cfcf7146733e02929080b2b61824a57958cea4b5b656fd8cd38250c895ecbf9fcbc6e3ba549a08d585ec7dc96d7230db9618fa4eac9522eb03636806140c2571f619fe3b4dcd98c26c9e9bc4be3e6974a4cf024174550c0aca8c3b3120daae4ba295f4e657abeb39b978dbf73f2fff2f4b1253a8603cc86766dd06f9dd90243a6592eba57c7f04d2db5d268257d26fb3566daa0327e7cda5cb8155961a58", 0xc9}, {&(0x7f0000003280)="fa9a2c01ca7c9a0e40d1ba8aa86cb658", 0x10}, {&(0x7f00000032c0)}], 0x7}}, {{&(0x7f0000003380)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000033c0)="b99695048d5d4433dc87a390ffa064cd9bf11f26684568117a86d8476356153aebf29aeae32de62d3ba7ade1dd6174d3e7cd84713b9f2df1c8058f6141c8330589656b16d603b444774fe8cb2d86fdc1788b5f2fa481029c4efe8c5b6f06ff4c9243eccab22ac8f84c9e48ee6fc230f226bf977ced839c344a4c58cc88d216ade37d92fb2349fd3da82d59a5ac778349f1161e7f77c12eca0b84f9f87576", 0x9e}, {&(0x7f00000005c0)="2385d4a7ea4001138c3b", 0xa}, {&(0x7f0000000800)="c154812c636f57acdec95ed1aafe17a3121ece48d148a017723274add2bd50839d632253d12a0529789df200afb749c5753554551eb77f0a5135413d09cd68a24a09a4a7b21e473c513b7540641fbc36cc25d4c834db525ce61aef3cb55ed34e44d6ebbd63c771d9fdc419e2a7a04d088df5f1d0fe6c85ce0f7cb671912cb43e1789e18bd1662d7f1c7c7b604f8e7eef7c52f69ba367ad4e5fe4532c3ccd6c3e1daa1bce185e5f4dde10c9bc784bd766beaa868f4c7854946274b52481cf150a6f3333f468da2433e66ec77657c95c06ecc108243399d6660c58959d4f6f5d9d0fa141d05f", 0xe5}], 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x70}}], 0x7, 0x800) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, r1, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000140)=""/255) [ 1160.929607][ T8016] new mount options do not match the existing superblock, will be ignored [ 1161.007667][ T8021] new mount options do not match the existing superblock, will be ignored [ 1161.044186][ T8022] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=36 sclass=netlink_tcpdiag_socket pid=8022 comm=syz-executor.4 [ 1161.263994][ T8020] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.340674][ T8017] IPVS: Error connecting to the multicast addr [ 1161.380167][ T8021] new mount options do not match the existing superblock, will be ignored [ 1161.467106][ T8022] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=36 sclass=netlink_tcpdiag_socket pid=8022 comm=syz-executor.4 13:48:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 13:48:48 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0xd0f304bfe59818e) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000280)='./bus\x00', 0x10b843, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) renameat2(r3, &(0x7f0000000080)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x2) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x450020, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r5, 0xc0884123, &(0x7f00000001c0)={0x6, "f7df2e52041cbfe3a5e397e083af8a075738de20f94eb781327a41276a75bb69227293b814684e3516cb80a20f8c1244a9a67c12ed68a38caaca653db9dce72c", {0x2, 0x2}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./bus\x00', 0x0, 0x8}, 0x10) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x50, r6, 0x10000000) 13:48:48 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x318, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}]}, 0x318}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:48 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d7933a611d019cdb075d50458aa17702100d41a896ec48040000da686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:48 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, 0x3e9, 0x200, 0x70bd2a, 0x25dfdbfe, {0x64, 0x0, 0x1, r1, 0x6, 0x100, 0x4, 0x80000000, 0x0, 0x78}, ["", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc045) r2 = open(&(0x7f0000000240)='./file0/file0\x00', 0x800, 0x2) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:48 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1163.522334][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 1163.522347][ T27] audit: type=1804 audit(1594734528.301:797): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1163.608870][ T27] audit: type=1804 audit(1594734528.331:798): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1163.638232][ T8042] new mount options do not match the existing superblock, will be ignored 13:48:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) connect$qrtr(r2, &(0x7f0000000000)={0x2a, 0x0, 0x8000}, 0xc) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:48:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:48:48 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x318, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}]}, 0x318}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000080), &(0x7f0000000140)) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x3}, 0x4) [ 1163.807379][ T27] audit: type=1804 audit(1594734528.341:799): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 13:48:48 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x6, 0x800) r1 = socket$kcm(0x10, 0x2, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x922f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9daa342e", @ANYRES16=r2, @ANYBLOB="01000000000000000000090000003c00038008000100010000001400000000080003000000000014000e00ff02000000000000000000000000000100"/74], 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r2, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x75e}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:48 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) bind$pptp(r3, &(0x7f00000000c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1163.986598][ T27] audit: type=1804 audit(1594734528.351:800): pid=8051 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1280/bus" dev="sda1" ino=16340 res=1 [ 1164.006773][ T8063] new mount options do not match the existing superblock, will be ignored 13:48:48 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x318, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}]}, 0x318}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:48 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@multicast, @random="f600442800", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @timestamp}}}}, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1164.142984][ T27] audit: type=1804 audit(1594734528.351:801): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1164.180253][ T8073] new mount options do not match the existing superblock, will be ignored 13:48:49 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:48:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x4, @mcast2, 0xc}, 0x1c) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f00000001c0)=0x54) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1164.306912][ T8091] new mount options do not match the existing superblock, will be ignored [ 1164.355072][ T27] audit: type=1804 audit(1594734528.351:802): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1164.356873][ T8094] new mount options do not match the existing superblock, will be ignored 13:48:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r6, 0x40305652, &(0x7f0000000140)={0x7ff, 0x4, 0x8, 0x5, 0x1, 0xb8, 0x23}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x4, 0x0, {0x3, 0x7, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) dup3(r4, r3, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f00000000c0)={0x4, 0x4}) 13:48:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000040)) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)=0x5) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x8000) 13:48:49 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @mss={0x2, 0xffffff81}, @mss={0x2, 0x7}, @window={0x3, 0x6, 0xe784}], 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) open(&(0x7f00000002c0)='./file0\x00', 0xb8a4d6ebbed5169e, 0xd1) dup3(r4, r3, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0xfffffffc, 0x4) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1164.512056][ T27] audit: type=1804 audit(1594734528.361:803): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1164.681856][ T27] audit: type=1804 audit(1594734528.361:804): pid=8041 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1164.711960][ T8104] new mount options do not match the existing superblock, will be ignored [ 1164.751396][ T27] audit: type=1804 audit(1594734528.411:805): pid=8046 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1280/bus" dev="sda1" ino=16340 res=1 [ 1164.794727][ T27] audit: type=1804 audit(1594734528.441:806): pid=8053 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1667/bus" dev="sda1" ino=16342 res=1 [ 1164.820297][ T8110] new mount options do not match the existing superblock, will be ignored 13:48:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:48:51 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x10000, 0x4) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) 13:48:51 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:51 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x7, &(0x7f00000000c0)={@mcast2}, &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:51 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x8000000) 13:48:51 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1166.997750][ T8123] new mount options do not match the existing superblock, will be ignored 13:48:51 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x0, 0x0) close(r1) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000000)={0x9, 0x1, {0x0, 0x1, 0xfffffff9, 0x1}, 0x7}) [ 1167.040700][ T8128] new mount options do not match the existing superblock, will be ignored 13:48:51 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:51 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r5, 0x4008af00, &(0x7f0000000000)=0x8000) [ 1167.217195][ T8128] new mount options do not match the existing superblock, will be ignored 13:48:52 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x541c, &(0x7f00000000c0)={0xd, 0x8}) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:52 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x202) ioctl$TCSBRKP(r3, 0x5425, 0xffffffff) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000240)) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1167.326422][ T8150] new mount options do not match the existing superblock, will be ignored [ 1167.599338][ T8161] new mount options do not match the existing superblock, will be ignored [ 1167.804516][ T8166] new mount options do not match the existing superblock, will be ignored 13:48:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:48:54 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x7f, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000140)=0x5) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000000)={0xcf5e, "103a10ca4144f2d4c0529f945b8300d181da28cac84fa0a992e7185984850345", 0x1, 0x0, 0x3, 0xc000c, 0x12, 0x8}) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) 13:48:54 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="58000000290036032dbd7000fbdbdf2500000000", @ANYRES32=r4, @ANYBLOB="0a00f2fff3ff0f000e00030006000500ff0000000c000100736b627072696f000800010073666200090001007072696f000000000c000100696e677265737300"], 0x58}, 0x1, 0x0, 0x0, 0x36dea76224bee6ce}, 0x880) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[], 0x1) dup3(r7, r6, 0x0) finit_module(r7, 0x0, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000200)) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:54 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) lseek(r0, 0x7, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:54 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) restart_syscall() r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1ff, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="87da1a62eff99163d05c10aa01fc60d95df19a8ea23d2675d20d7b053406a75f7bc81df32194c03e1569bab6b6ceee14167ed0684cc529190a92675b75be158aec087d1e304205d5f6c6e511789f1d676468f5de3ec93261f7b71b692f06d690ce0284d63118a7ee6b009622217113b272ee6ee85a7a58b4", 0x78, 0xfff}], 0x20020, &(0x7f0000000400)={[{@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@gid={'gid', 0x3d, r2}}, {@utf8='utf8'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_recover='errors=recover'}], [{@smackfshat={'smackfshat', 0x3d, '@{/+/+'}}, {@euid_gt={'euid>', r3}}, {@hash='hash'}]}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1fd, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="87da1a62eff99163d05c10aa01fc60d95df19a8ea23d2675d20d7b053406a75f7bc81df32194c03e1569bab6b6ceee14167ed0684cc529190a92675b75be158aec087d1e304205d5f6c6e511789f1d676468f5de3ec93261f7b71b692f06d690ce0284d63118a7ee6b009622217113b272ee6ee85a7a58b4", 0x78, 0xfff}], 0x1240000, &(0x7f0000000500)={[{@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@disable_sparse_yes='disable_sparse=yes'}, {@utf8='utf8'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_recover='errors=recover'}, {@umask={'umask', 0x3d, 0x6}}, {@case_sensitive_no='case_sensitive=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@show_sys_files_no='show_sys_files=no'}, {@nls={'nls', 0x3d, 'cp737'}}], [{@smackfshat={'smackfshat', 0x3d, '@{/+/+'}}, {@dont_measure='dont_measure'}, {@hash='hash'}]}) setregid(r2, r5) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1170.087957][ T27] kauditd_printk_skb: 53 callbacks suppressed [ 1170.087978][ T27] audit: type=1804 audit(1594734534.862:860): pid=8179 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1306/bus" dev="sda1" ino=16341 res=1 [ 1170.098631][ T8175] new mount options do not match the existing superblock, will be ignored [ 1170.158964][ T8184] new mount options do not match the existing superblock, will be ignored [ 1170.196565][ T27] audit: type=1804 audit(1594734534.902:861): pid=8176 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1672/bus" dev="sda1" ino=16342 res=1 [ 1170.238186][ T8186] new mount options do not match the existing superblock, will be ignored [ 1170.244046][ T27] audit: type=1804 audit(1594734534.962:862): pid=8188 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1306/bus" dev="sda1" ino=16341 res=1 13:48:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1000000000022, &(0x7f00000001c0)=0x1, 0x2a) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)='\x00', 0x1}, {0x0, 0x3}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400c875) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) finit_module(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x50, 0x1, 0x7, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x2d}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x4d50b206}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x400}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x20}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x88) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x40151c95) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000380)='./bus\x00', 0x580000, 0x90) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x2, 0x3}}, 0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x18080, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0xf2) 13:48:55 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2000, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:55 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:55 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1170.389135][ T27] audit: type=1804 audit(1594734534.972:863): pid=8191 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1672/bus" dev="sda1" ino=16342 res=1 13:48:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x48004}, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @none}, &(0x7f0000000040)=0xe, 0x80800) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000080)=0x10000, 0x4) 13:48:55 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x71) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x16}, 0x4}}, [0x1dbe1c59, 0x6, 0x0, 0x100, 0x401, 0x7, 0x80, 0x5, 0x7ff, 0x3, 0x59, 0x10001, 0x80000001, 0x400000000, 0xffff]}, &(0x7f0000000240)=0x100) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r0}, {0xffffffffffffffff, 0x301d}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000280)=0x9, 0x4) [ 1170.605332][ T8219] new mount options do not match the existing superblock, will be ignored [ 1170.620774][ T27] audit: type=1804 audit(1594734535.392:864): pid=8220 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1308/bus" dev="sda1" ino=16377 res=1 [ 1170.694111][ T8215] new mount options do not match the existing superblock, will be ignored 13:48:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x58) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000000)={0x3, 0x1}) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0x5, 0x2184a1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) accept4$phonet_pipe(r4, &(0x7f0000000080), &(0x7f0000000140)=0x10, 0x80800) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r5) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000200)={0x0, &(0x7f0000000180)="9591a89067cd1480459022ccf3821a6b0d45b11c6fb59fe76bf5b742b17eefece0d04f4c6c2bf8f9a95ed975c37189df1af0ae17090595a69f99811c76e84908f4609d742a926d2599c66b45a8fecdb48bd6319f2bc5a8361edb7a703c8d14234e7ace0eb6aac9e2cf63b8f4adab3b6e05f95050877550dceb50", 0x7a}) [ 1170.746176][ T8214] new mount options do not match the existing superblock, will be ignored [ 1170.766906][ T27] audit: type=1804 audit(1594734535.542:865): pid=8227 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1287/bus" dev="sda1" ino=16327 res=1 [ 1170.859525][ T27] audit: type=1804 audit(1594734535.622:866): pid=8232 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1287/bus" dev="sda1" ino=16327 res=1 [ 1170.929843][ T27] audit: type=1804 audit(1594734535.692:867): pid=8233 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1674/bus" dev="sda1" ino=15753 res=1 [ 1171.023543][ T27] audit: type=1804 audit(1594734535.702:868): pid=8233 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1674/bus" dev="sda1" ino=15753 res=1 [ 1171.073844][ T27] audit: type=1804 audit(1594734535.702:869): pid=8233 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1674/bus" dev="sda1" ino=15753 res=1 13:48:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:48:57 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:57 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(r2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:48:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r4, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x10000006, 0x0, 0x0, 0x0, &(0x7f0000001600)={0x2, 0x2}, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r3, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00', r5}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0xc) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000140)=0x1000) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'batadv_slave_0\x00'}}, 0x1e) 13:48:57 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x200802, 0x62) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x11, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', r3, 0xe1637bbde46dd049, 0x5, 0x7, 0x0, 0x4, @remote, @loopback, 0x8, 0x8, 0x10001, 0x5e}}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x8008af26, &(0x7f0000000000)=0x100000000) 13:48:57 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x7477}, {r5, 0xb592}], 0x2000000000000254, 0x0, 0x0, 0xffffffffffffff6e) [ 1173.162280][ T8244] new mount options do not match the existing superblock, will be ignored 13:48:58 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r4, 0x4028af11, &(0x7f0000000340)={0x2, 0x0, &(0x7f00000001c0)=""/74, &(0x7f0000000240)=""/67, &(0x7f0000000300)=""/24, 0x100000}) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x3a, 0x0, "2e654e6ffe1b05ac3482de8a10ced19e46ce450d97d0f2fe23790422363af81b7766803f981ea714520b1e10a915e606a26dd7f05cd72226296e444ead102635123eace055091e50379333163a146573"}, 0xd8) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:58 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:48:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000040)=0x3) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1, 0x3}) [ 1173.292167][ T8245] new mount options do not match the existing superblock, will be ignored 13:48:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x1, 0x48) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000140)="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", 0x1000) finit_module(r2, 0x0, 0x0) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x39c) [ 1173.447311][ T8266] new mount options do not match the existing superblock, will be ignored 13:48:58 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x80000, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r5}, {r4, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:48:58 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) accept(r2, &(0x7f0000000200)=@tipc=@name, &(0x7f00000002c0)=0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@nfc_llcp, &(0x7f0000000380)=0x80) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1173.548532][ T8269] new mount options do not match the existing superblock, will be ignored [ 1173.764673][ T8281] new mount options do not match the existing superblock, will be ignored 13:49:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:49:00 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:00 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) fremovexattr(r4, &(0x7f0000000200)=@known='system.sockprotoname\x00') socketpair(0x2b, 0x2, 0x7fffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000040)={0x980000, 0xec, 0x10001, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x98092a, 0x5, [], @value=0xc0000}}) write$P9_RFSYNC(r6, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) 13:49:00 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000200)=""/63, 0x3f) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:00 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e23, 0x20, @private1, 0x8a6e}, 0x1c) r3 = dup(r0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, 0x0, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xac, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x404a004}, 0x4004885) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f00000000c0)={0x3, {{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, {{0xa, 0x4e21, 0x10000, @private1={0xfc, 0x1, [], 0x1}, 0x800}}}, 0x108) ppoll(&(0x7f0000000000)=[{r4}, {r3, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1176.203063][ T27] kauditd_printk_skb: 35 callbacks suppressed [ 1176.203077][ T27] audit: type=1804 audit(1594734540.982:905): pid=8297 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1290/bus" dev="sda1" ino=16259 res=1 [ 1176.230287][ T8296] new mount options do not match the existing superblock, will be ignored [ 1176.276604][ T27] audit: type=1804 audit(1594734541.052:906): pid=8299 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1677/bus" dev="sda1" ino=16382 res=1 [ 1176.340626][ T8306] new mount options do not match the existing superblock, will be ignored [ 1176.354446][ T27] audit: type=1804 audit(1594734541.052:907): pid=8297 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1290/bus" dev="sda1" ino=16259 res=1 [ 1176.387748][ T27] audit: type=1804 audit(1594734541.052:908): pid=8299 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1677/bus" dev="sda1" ino=16382 res=1 [ 1176.412103][ T8296] new mount options do not match the existing superblock, will be ignored 13:49:01 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x3, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)={0x5000, 0x2000, 0x8, 0x5, 0xfff}) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) 13:49:01 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000), 0x1fffffffffffffcf, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x6, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x7}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) ioctl$HIDIOCGFIELDINFO(r1, 0xc038480a, &(0x7f00000000c0)={0x1, 0x200, 0x3, 0x0, 0x64b7, 0xb2, 0x2, 0x2, 0x10000, 0x3, 0x3, 0x8, 0x80, 0x40000000}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x1, 0x0) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x5) 13:49:01 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) socket$packet(0x11, 0x3, 0x300) 13:49:01 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvme-fabrics\x00', 0xc0800, 0x0) recvfrom$ax25(r0, &(0x7f00000002c0)=""/177, 0xb1, 0x40000021, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000200)={0x4002, 0x20, 0x7, 0x81}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1176.538326][ T27] audit: type=1804 audit(1594734541.052:909): pid=8299 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1677/bus" dev="sda1" ino=16382 res=1 [ 1176.628699][ T27] audit: type=1804 audit(1594734541.092:910): pid=8302 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1312/bus" dev="sda1" ino=16380 res=1 13:49:01 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x5, 0x4) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000180)) keyctl$chown(0x4, r3, r4, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000001300)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="5cd5aa6c7b8b97313d72cc41cb366b2b2302a570fd6dcf5000e926690a832c7add6866603373d5afe7f6e1d74a596701c308f10c18564cb2792ac63e2c5b0ed468deb689365f63bac7860c5f2ce32eb96e2eb462", 0x54, 0x81}, {&(0x7f0000000300)="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", 0x1000, 0x7}], 0x20440, &(0x7f0000001480)={[{@show_sys_files_no='show_sys_files=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@nls={'nls', 0x3d, 'cp932'}}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@obj_user={'obj_user', 0x3d, '*'}}, {@appraise='appraise'}, {@uid_lt={'uid<'}}, {@uid_eq={'uid', 0x3d, r4}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@euid_gt={'euid>', r8}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}]}) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1176.734311][ T27] audit: type=1804 audit(1594734541.102:911): pid=8302 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1312/bus" dev="sda1" ino=16380 res=1 [ 1176.757828][ T8332] new mount options do not match the existing superblock, will be ignored [ 1176.851885][ T8326] new mount options do not match the existing superblock, will be ignored [ 1176.905275][ T27] audit: type=1804 audit(1594734541.102:912): pid=8302 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1312/bus" dev="sda1" ino=16380 res=1 [ 1176.990933][ T27] audit: type=1804 audit(1594734541.132:913): pid=8308 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir605057890/syzkaller.eTPBZ2/1312/bus" dev="sda1" ino=16380 res=1 [ 1177.065671][ T27] audit: type=1804 audit(1594734541.132:914): pid=8299 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1677/bus" dev="sda1" ino=16382 res=1 13:49:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000040)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0xc8) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000100)={{0x1, @addr=0x8}, "46bafe97aa486b2fad877f9f6c134dcf363dc1ff81ff1e5028473ca560e44bc0", 0x2}) 13:49:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {}, {&(0x7f0000000280)="895b74e29fc8e535522bed7a32ea79b717bc42ac3a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98d3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a03842468c1c785c0650bfa609783ef07e6a3b250e08da881b947e51034f991107000000b078062fe3dbc3b1146b08eeb483ae3bf94ad7bfa1c5160e5794ae739ad0a506c6f1a9f18ec210", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:49:04 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:04 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x149800, 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000100)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r3}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:04 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x2000, &(0x7f000003f000/0x2000)=nil}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@private2}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8801, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000005c0)={[0x150, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f00000000c0)=0x6b) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x3824, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) 13:49:04 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) quotactl(0x3b, &(0x7f0000000200)='./file0\x00', r0, &(0x7f00000002c0)="b59b9cd7f0a7a7eeee8cf98c7a8b5aabfed3faefb29ec4d7fcd876ff798a51709fb82b93b05d6caedfad2bf323c2a559f20e2bbc038f4a1df41525d96eded6fed2c7cbcab88d4a22237200b8d25cbfac18cae759281e0fe02f0b469f0cf3cbf5517a6bc6ff6bce1d546899cdd6175109a4c95fb4d3af402b5cba7a13e3b98b2b2081aa83a1a8e8166677f76daf84be8880709f8e6298") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000240)={0xff, 0x4, [0xfff]}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={r6, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r6, 0x0, 0x5, 0x8}, 0x10) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) ppoll(&(0x7f00000001c0)=[{r4}, {r1, 0x2}, {0xffffffffffffffff, 0x1}, {r3, 0x4010}, {0xffffffffffffffff, 0x1}], 0x5, 0x0, 0x0, 0x0) [ 1179.467188][ T8351] new mount options do not match the existing superblock, will be ignored 13:49:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000001b80)=[{&(0x7f0000000000), 0x2}, {&(0x7f0000000040)=0x1, 0x2}, {&(0x7f0000000080), 0x1}, {&(0x7f0000000140)=0x2, 0x1}, {&(0x7f0000000180)=0x1}, {&(0x7f00000001c0)=0x2, 0x1}, {&(0x7f0000000200)=0x1, 0x2}, {&(0x7f0000000240)=0x1}, {&(0x7f0000000280)}, {&(0x7f00000002c0)}, {&(0x7f0000000300)=0x1, 0x2}, {&(0x7f0000000340)=0x2}, {&(0x7f0000000380)=0x2, 0x2}, {&(0x7f00000003c0)=0x1}, {&(0x7f0000000400), 0x2}, {&(0x7f0000000440)=0x1, 0x2}, {&(0x7f0000000480)=0x1, 0x1}, {&(0x7f00000004c0), 0x1}, {&(0x7f0000000500)=0x2}, {&(0x7f0000000540)=0x2}, {&(0x7f0000000580)=0x1, 0x1}, {&(0x7f00000005c0)=0x1}, {&(0x7f0000000600)=0x2, 0x1}, {&(0x7f0000000640)=0x2, 0x2}, {&(0x7f0000000680)=0x1, 0x1}, {&(0x7f00000006c0)=0x2, 0x2}, {&(0x7f0000000700)=0x2}, {&(0x7f0000000740)=0x2}, {&(0x7f0000000780)=0x1, 0x1}, {&(0x7f00000007c0)=0x2}, {&(0x7f0000000800), 0x1}, {&(0x7f0000000840)=0x2, 0x1}, {&(0x7f0000000880)=0x1, 0x2}, {&(0x7f00000008c0)=0x1}, {&(0x7f0000000900)=0x1, 0x1}, {&(0x7f0000000940)=0x2}, {&(0x7f0000000980)=0x2, 0x1}, {&(0x7f00000009c0)=0x2}, {&(0x7f0000000a00), 0x2}, {&(0x7f0000000a40)=0x1}, {&(0x7f0000000a80), 0x2}, {&(0x7f0000000ac0)=0x1, 0x1}, {&(0x7f0000000b00), 0x2}, {&(0x7f0000000b40)=0x2}, {&(0x7f0000000b80)}, {&(0x7f0000000bc0)=0x1}, {&(0x7f0000000c00)=0x2, 0x2}, {&(0x7f0000000c40)=0x2}, {&(0x7f0000000c80)=0x1, 0x2}, {&(0x7f0000000cc0)=0x1, 0x2}, {&(0x7f0000000d00)}, {&(0x7f0000000d40)=0x2, 0x2}, {&(0x7f0000000d80), 0x1}, {&(0x7f0000000dc0)=0x2, 0x2}, {&(0x7f0000000e00)=0x2}, {&(0x7f0000000e40), 0x1}, {&(0x7f0000000e80)=0x2}, {&(0x7f0000000ec0)=0x2, 0x1}, {&(0x7f0000000f00)=0x1, 0x2}, {&(0x7f0000000f40)=0x1, 0x2}, {&(0x7f0000000f80)=0x2}, {&(0x7f0000000fc0)=0x2, 0x2}, {&(0x7f0000001000)=0x2}, {&(0x7f0000001040)=0x2, 0x2}, {&(0x7f0000001080)=0x2}, {&(0x7f00000010c0)=0x1, 0x2}, {&(0x7f0000001100)=0x2}, {&(0x7f0000001140)=0x2}, {&(0x7f0000001180), 0x2}, {&(0x7f00000011c0)=0x2, 0x1}, {&(0x7f0000001200)}, {&(0x7f0000001240)}, {&(0x7f0000001280)}, {&(0x7f00000012c0)}, {&(0x7f0000001300), 0x1}, {&(0x7f0000001340), 0x2}, {&(0x7f0000001380)=0x2}, {&(0x7f00000013c0)=0x1}, {&(0x7f0000001400)=0x2}, {&(0x7f0000001440)=0x2, 0x2}, {&(0x7f0000001480)=0x2}, {&(0x7f00000014c0)=0x2}, {&(0x7f0000001500)=0x2, 0x2}, {&(0x7f0000001540), 0x2}, {&(0x7f0000001580)=0x1, 0x1}, {&(0x7f00000015c0), 0x2}, {&(0x7f0000001600), 0x2}, {&(0x7f0000001640), 0x2}, {&(0x7f0000001680)=0x2, 0x2}, {&(0x7f00000016c0)=0x2, 0x1}, {&(0x7f0000001700), 0x2}, {&(0x7f0000001740)=0x2, 0x2}, {&(0x7f0000001780)=0x1}, {&(0x7f00000017c0), 0x2}, {&(0x7f0000001800)=0x1, 0x1}, {&(0x7f0000001840)}, {&(0x7f0000001880)=0x1, 0x1}, {&(0x7f00000018c0)=0x1, 0x2}, {&(0x7f0000001900)=0x1}, {&(0x7f0000001940)=0x1}, {&(0x7f0000001980)=0x1}, {&(0x7f00000019c0), 0x1}, {&(0x7f0000001a00)=0x1}, {&(0x7f0000001a40)=0x2, 0x101}, {&(0x7f0000001a80)=0x2, 0x1}, {&(0x7f0000001ac0)=0x2, 0x1}, {&(0x7f0000001b00), 0x1}, {&(0x7f0000001b40)}], 0xd, 0x6c, &(0x7f0000002240)={0x0, 0x989680}, 0x0, 0x0) 13:49:04 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1179.578951][ T8371] new mount options do not match the existing superblock, will be ignored 13:49:04 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) recvmsg(r0, &(0x7f00000008c0)={&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f00000005c0)=""/241, 0xf1}, {&(0x7f00000006c0)=""/149, 0x95}], 0x3, &(0x7f00000007c0)=""/220, 0xdc}, 0x40000000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xaa, 0x2, 0x3, "5f75ed8ee847e317a69da2d91f632450", "c443521436731670b6d4ed9c8ae8ceeccf0ca4ed2ece4390f9c00ef4deb42091b653f00989af579764ac27a74aafbcdb64ebd2704766b59a056be57bf853682aedc8a2154628aa3e8900f23db345b3b544d712f73089b78634496e84354f3dbfa0f4075279bcda1cf4af2677739e76e0c498d1c840cf03cf5988fcf46193bbe13aee7e100d181c5cb555cd085590eca5796727b32d"}, 0xaa, 0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) [ 1179.808526][ T8380] new mount options do not match the existing superblock, will be ignored [ 1179.887703][ T8385] new mount options do not match the existing superblock, will be ignored 13:49:04 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1180.031986][ T8394] new mount options do not match the existing superblock, will be ignored 13:49:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/166, 0xa6}], 0x1, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "98cc8ffac2d9798000"}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ovf\x00', 0x0, 0x0, 0x2c}, 0x2c) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4810, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x8008af26, &(0x7f0000000100)) [ 1180.126697][ T8397] new mount options do not match the existing superblock, will be ignored [ 1180.232396][ T8403] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 1180.260510][ T8403] EXT4-fs (loop5): filesystem is read-only [ 1180.267238][ T8403] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1180.277288][ T8403] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1180.287348][ T8403] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1180.297881][ T8403] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (1392!=0) [ 1180.321044][ T8403] EXT4-fs (loop5): filesystem is read-only [ 1180.335680][ T8403] EXT4-fs (loop5): orphan cleanup on readonly fs [ 1180.349736][ T8403] EXT4-fs error (device loop5): ext4_quota_enable:6001: inode #9: comm syz-executor.5: iget: bad extended attribute block 808464416 [ 1180.435118][ T8403] EXT4-fs error (device loop5): ext4_quota_enable:6003: comm syz-executor.5: Bad quota inode # 9 [ 1180.456584][ T8403] EXT4-fs warning (device loop5): ext4_enable_quotas:6040: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1180.499244][ T8403] EXT4-fs (loop5): Cannot turn on quotas: error -117 [ 1180.519348][ T8403] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:49:07 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0xe8, 0x464, 0x4, 0x70bd29, 0x25dfdbfd, "b05fc10c065f47a91453d8dad00d12ed77137f46c56e56bab9c8c0dba47a168deb63a82d0981945e1cb6dd168966e5ca3bcdf6c50ba88947007df0b914b85f02c077f5ff5d56b872b0f4270a25bbd4624bc87fec246f6891bc6dbeebac3f69af6949d5f1ac07fd47043401ff4f4ce99d66c7e40ac7ed366feab9fc0c54c18fcc87a5b0893ffbd413faaa2f432a6d3b5c64ca83b435d562dce2c7b26462e092cbbce715f816f3f1dd8f5c1f3116680fec3ecdba88ef34804511fd2828cebb5f4a2a20abd4271979f2826fe233781a8be66c55ce31ea", ["", ""]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000085}, 0x20000001) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x58, r5, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1d}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2a}]}, 0x58}, 0x1, 0x0, 0x0, 0x20048080}, 0x0) symlink(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000440)='./bus\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r5, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, [], 0x1}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @rand_addr=0x64010102}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x37}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0xa}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010100}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x4048000) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:07 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000200)=0x1) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:07 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_256={{0x185}, "6709b1cba76c23d5", "7af7ee91c419cffc2b710dba8df1e7cef46334558f39d8369399ca429df66a9e", "9c95b70e", "7af9196011e99dea"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000100)=0xd4b) 13:49:07 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f0000000140)=""/85, 0x55) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=r1, r3, 0x4}, 0x10) 13:49:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1182.458340][ T27] kauditd_printk_skb: 19 callbacks suppressed [ 1182.458355][ T27] audit: type=1804 audit(1594734547.233:934): pid=8433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000000c0)={0x1, 0x1, 'client1\x00', 0xffffffff80000002, "707e3b07bf2e0331", "0c174a947c0af1fb27d9e79fa904d91b46a8a42ed7866423788e6b7b41696e99", 0x6, 0x80000000}) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1182.555164][ T8435] new mount options do not match the existing superblock, will be ignored [ 1182.637711][ T27] audit: type=1804 audit(1594734547.273:935): pid=8433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 [ 1182.659564][ T8436] new mount options do not match the existing superblock, will be ignored 13:49:07 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010025bd7000fddbdf251800000008000100040000000c00990000080000030000000c0099000700000004000ffce3c20300348d7620b626ad7ae0d8a7f4d6b37ec98bd8276c159d8fc43ff4fc8b8cf7c3cd05900c62f23bd39c7f33b0151b1574035bb3c3b123813519011b3b53bde2705c5c4d09f107c62cb16836a8bc71270eff9e53f0d8df230f79216e64", @ANYRES32=r4, @ANYBLOB="08000100030000000a001a002d4deff6439200000a000600bbbbbbbbbbbb0000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000140)=""/238) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[], 0x1) dup3(r7, r6, 0x0) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, &(0x7f0000000300)={[0x5000, 0x4000, 0x0, 0xd000], 0x6, 0x4a, 0x5}) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r8, 0x4008af00, &(0x7f0000000100)=0x8000000) 13:49:07 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, '\x00', "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1182.826301][ T8443] new mount options do not match the existing superblock, will be ignored [ 1182.854429][ T27] audit: type=1804 audit(1594734547.273:936): pid=8433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 13:49:07 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@nl=@kern={0x10, 0x0, 0x0, 0x4}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) unlinkat(r0, &(0x7f0000000200)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='ocfs2_dlmfs\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x4, &(0x7f0000000240)=[{0x3ff, 0x20, 0x6, 0xca}, {0x200, 0x0, 0x57, 0xfffffffe}, {0x9, 0x8, 0x1, 0x498b674c}, {0xc7, 0x80, 0x1, 0x3}]}, 0x10) 13:49:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x304}, "1a9e8b0b10abfa1f", "5045a1771f100d41a89eec48c21f064d686f368a00", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1183.029146][ T27] audit: type=1804 audit(1594734547.303:937): pid=8437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1683/bus" dev="sda1" ino=16336 res=1 [ 1183.057784][ T8464] new mount options do not match the existing superblock, will be ignored 13:49:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:07 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:07 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1183.205878][ T27] audit: type=1804 audit(1594734547.313:938): pid=8437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1683/bus" dev="sda1" ino=16336 res=1 [ 1183.368429][ T27] audit: type=1804 audit(1594734547.313:939): pid=8437 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1683/bus" dev="sda1" ino=16336 res=1 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x50000) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1183.396897][ T27] audit: type=1804 audit(1594734547.353:940): pid=8433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 [ 1183.468383][ T8496] new mount options do not match the existing superblock, will be ignored 13:49:08 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = accept4(r0, &(0x7f0000001bc0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000001c40)=0x80, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000001c80)='],+:/#\\\xc5\x00', 0x9) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:08 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xc0, 0xb, 0x6, 0x301, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x50, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR2={0x5, 0x15, 0x5}, @IPSET_ATTR_IFACE={0x14, 0x17, 'nr0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6fb0}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x554}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x1f}, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x72}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xf539}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x100}, @IPSET_ATTR_COMMENT={0xc, 0x1a, '\'),:t/(\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x79e}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0xc0}, 0x1, 0x0, 0x0, 0x60008040}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f00000003c0)) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:08 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x3f9, 0x1, 0x70bd2a, 0x25dfdbff, {0x0, 0x1}, ["", "", "", "", ""]}, 0x18}}, 0x0) [ 1183.597227][ T27] audit: type=1804 audit(1594734547.353:941): pid=8433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 [ 1183.781286][ T27] audit: type=1804 audit(1594734547.363:942): pid=8442 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1293/bus" dev="sda1" ino=16339 res=1 [ 1183.817951][ T8522] new mount options do not match the existing superblock, will be ignored [ 1183.825353][ T27] audit: type=1804 audit(1594734547.373:943): pid=8436 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1409/bus" dev="sda1" ino=16355 res=1 13:49:08 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x2) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x10000001c) [ 1183.936824][ T8526] new mount options do not match the existing superblock, will be ignored [ 1184.004954][ T8522] new mount options do not match the existing superblock, will be ignored 13:49:08 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:08 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x4) 13:49:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:09 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) bind$bt_sco(r0, &(0x7f0000000140)={0x1f, @fixed={[], 0x12}}, 0x8) dup3(r1, r0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x690, 0x78, 0x40, 0x600, 0x7fff, 0x8, 0x18, 0x0, {0x1000, 0x99}, {0x1, 0xfffffff9}, {0xc33, 0x3fb, 0x1}, {0x7f, 0x9}, 0x3, 0x2, 0x5, 0xffffffff, 0x1, 0xfffffff9, 0x6, 0x8, 0x9, 0x7fff, 0x3ff, 0x8000, 0x10, 0x4, 0x1, 0x8}) 13:49:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1184.298054][ T8544] new mount options do not match the existing superblock, will be ignored [ 1184.322270][ T8545] new mount options do not match the existing superblock, will be ignored 13:49:09 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1184.467672][ T8544] new mount options do not match the existing superblock, will be ignored 13:49:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:09 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x2) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:09 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x23, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r1 = dup(0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) setsockopt(r0, 0x3, 0x0, &(0x7f0000000500)="9816e0ed1fd343d02597e5436be96ea45925afa7eff3e21bea2c3d367a1838b1031fd8e80ece8a585696ced34c1b03605aaa74a0903f62201d9bbbfca0aafea477582f9140e317", 0x47) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@remote]}) dup3(r2, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f00000003c0)={0x3f, 0xb212, 0x7ff, 0x0, 0x1}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2d00000000dbdf2508000100020000000300000000000000080001000200000008000100011000"/48], 0x30}, 0x1, 0x0, 0x0, 0x20040891}, 0x20020000) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340), &(0x7f0000000380)=0x4) [ 1184.661917][ T8572] new mount options do not match the existing superblock, will be ignored 13:49:09 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f00000000c0)=0x100) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f0000000140)) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:09 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x20000004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000003c40)=[{{&(0x7f0000000200)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000002940)=[{&(0x7f00000002c0)="2c8950343c4ecca186fd66d3a7d0406f77aade00bd513ae73e948141d3e947c1592ea0747c22742073723f68288acac1db945bc0250846adb00b725b13110d89339657699fce6b74b66a833ab571add3fe08b8ddf7f25211a99fc24849b3758bcccb105f00be3f1893bb1b662cdf3c18616e4a590303d6c4ab47b95ca0e5e95bcd63fef219632fe5f3e982e81f69d0423ef0b485c31deee97c14c21ff56179126ce41cd09d13c63b97c1c1fcf13137fc34762d8ab15b1981d316d0159b835181791f6f18e62cc2853f8a3dc5b613aca15eaec38895d54ac2a9bd2f4e9b42fb7b8d266746c7e71bbfeca2d63ff497e57cbb359e45", 0xf4}, {&(0x7f0000000500)="8fb896f77feb3505ff101131ec1fedd14dec98d7ee5b8f46b45146355ac1750636e161371f1268f25e3c3cbdf99330cc67a21207ed303e8fe41d98a07b3d90843b2eecd1d476e5c798ff8939430fadb8898fb52e5a1c61f021a425c7de577729bf1120d9ab86b02596830dca04e6784f2c652627f3871db5d8ed05c1c109594b5540884c0a39382a20af3964fc7ba8fb50523591e300dbc76ab34ec486caabf0e986ab36889a1c29953f01f6460d02f0de09cdae30b142c750be1f85d67a33c0d118e283bcc8c67f", 0xc8}, {&(0x7f0000000600)="26adfdd9208dfd06bfd9cb1195149baf5c3ef22ccc9faf3d33fe33c04ede8dc548a7b719cf8562be3ead2c6af5f130494e82c8b2e2d24c60d116f49de522288b8e40ab716ed2f7dc964462a3a6ec26f4cc4b6f37c3ca5b2c47db07142127c819940c175853cff8b6c31d09494e9e64d8afd424fdced6d1088624dd240962066f5376fc23a35fc60a2cfee151a1fd7254905c8a1bdc5a89a22837", 0x9a}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="186eeadb9ea0ce709c322fcb5c4cdfa37532349d7162579744bcfb9153fc9629a02d75c1946b3a4a35a61fa122ae583a02d48e91ddd63f7b6b6b8d794be007eedcc9fd835d514713395f78bfc232d70cc5dc12b4526355640d0ab8d950ea7554faa90925c912c2bc7f526a70de4d6d4809f0daa47141ddea80b2ab3f8da14d44d74a4f56d1428ce84d06a645d1aed420f2b64c1dbd8d0eac3b44de6e70332772adc0211c1d5b1afbce0a6023fe95ff5fcf88c018f3cfc5951a1c870ccd0f764f6337f3e41bbf16b37b4cfd116321829202e5f88132cf9901dd321d6b2228b18a2a7934", 0xe3}, {&(0x7f00000027c0)="ce6f722b1b389c8016485db4a49c74ff480496e8fa0a95d26346d12d8be14e22148a971d0b4cb7ff0b133ece36c3ccead1de0e4cecb04151c193f75f2aa6ac2edf57f6dff174f41227a46d4c722ebc6762262f2d29becdf877d6b0427864e2a79e14e8aca05cb4dbae558d318b6da17175544d50f3c703cf790de0a938b1563cbeda8d854394c3a48cf4806546e640dcd1f70bdea9dbe6bafa39cb88f6d0f5f50a04b2b950b4ff77fbae397418fa0a171c36463c7f2a579e4172baeb21566aba09de14c0e77187", 0xc7}, {&(0x7f0000003cc0)="78a1576b6bdeccec2d881fac53652f9dffd690fb41fbf928d80c622e5f12cdec0193920b0a9486242d42f6434e49b650e55f7cdda1910b6d3a38155abe98308ce1f331b72639d249787d47b46f2858143b72d2ab1c23383037d6f395f47aa7aa7631a7fa7efbb3149271b5ff88cfcf99f879100715157fabb220f09c35a1d81ef892ee7c114a148a0773ce1e413d7dad5da763bc9fe5728cc86ea5b3473ddcdc06ed5189a8191c6afd9d1bd150f91bb28cf7f82e0ddc6072b97d399e51a76adf1fa3e3b1024b749b01d651ec3c76a88923", 0x66}], 0x8, &(0x7f00000029c0)=[@ip_retopts={{0xf0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xf5, 0x1, 0x2, [{@rand_addr=0x64010100, 0x1}, {@multicast1, 0x3f}]}, @timestamp_addr={0x44, 0x76, 0xf7, 0x1, 0xf, [{@broadcast, 0x9}, {@multicast2, 0x7}, {@multicast1, 0x1}, {@rand_addr=0x64010100, 0xffff}, {@rand_addr=0x64010100, 0x2}, {@multicast1, 0xe9}]}, @timestamp_prespec={0x44, 0x34, 0x58, 0x3, 0x5, [{@remote, 0x4}, {@multicast2, 0x6}, {@multicast1, 0x82}, {@remote, 0x80000001}, {@multicast2, 0x9210}, {@multicast1, 0x7}]}, @timestamp={0x44, 0x28, 0x42, 0x0, 0x1, [0x8001, 0x7, 0x1ff, 0xab1, 0xed4, 0x8, 0x3, 0x2, 0x7d]}, @timestamp_addr={0x44, 0x3c, 0x79, 0x1, 0x8, [{@empty, 0x3}, {@remote, 0x85e}, {@private=0xa010100, 0x9}, {@multicast1, 0x40}, {@rand_addr=0x64010101, 0x9}, {@local, 0x4}, {@multicast2, 0xfffffc00}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}], 0x108}}, {{&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000002b00)="77046a9b760573aa9de0bfa98847cebb39091e600e6660c7a88a5c22fd94fa3bd914df4ef05e722d5ca1d5776a4e6bbbf2d8f205cae288fd0ba9b8fe3b7a9425e341b5a15633c7e94dc40116a53f85befc7a44495922109ce777435cf20803a499e8c1a578a68987ff11d63c8bb0877df7b0779bad9d2d615ddce8f27ac7556806fe4f25a62ae973dfb9f4fa79c284a970f7472397332b384b67cb5b90194f4bf47a6bcdc310aafede66339523942887e7f475f82e36646450d433be77300bbf3e220e89622a7384f4ab7a0d87fe2df7ccc1740a925fb0ee42d37258cb9f7475205740b9dc53e57e4c8a566761c5674fccd4358231a697fda56dfb8524d700e4304c7e1c8ae0627a9275a0f88cd8130e7a9a3d9bd34cf8089f17886920baeec93a359fc19efb44de5b93ee629c3cc826edf5828695fb1d640dc5963641cbb94fbe94c9e2b0b59350cb14b344bcfc7d99467b21d119f53bd544b17b1c59802a6cc8d2f28d9ed4139bedf6350a216a152db209cad32bf4c2d99be385c57da0f63090a6847a3236b4c4f2b7aa161471ef30bb802456c3d1aab5fe1eaef107d3dc5750a568bd93d766c7ce52cca3d3c610c69746a5c163830ceb5c0d113ae4f0359d41a8148ce2fbd09cc04ece95cdf9f62d3d6cbd5bc8fa23727eb558b39b61792f34eba7eee516aba0beef2a168f1c8ad7c3b7d415e4b0daad706ff3ff6d9342a1bbe6eeabff256fc5c9fd6d8b3978aa4326cd811f706380a8c502fdc8968763da895b5490e9922fb9ad0ae1944c89d0b083cfe4b0b0d9f9857e720f544e0dfd2e213711ce5ff970fe7e9fb8b6113f79ccfb91a72cfd76d8e098b0661985205af49eb11698d78c9fd8b6035a0463283b6475e63301f3fe9bbc264919339f1ca6ef419158bb319e221f7a715af013e85be90983ab4e5cbb33c06eabb5e590a996d27170227b8a8bbaf77aff3454308c92d8d294eec2dfa4744d3f12aebfacd66aaaae58eb1d68ed0a0bfc33499cea6b6d2c4eb843c1290f5d2e79a940485c2362fd2b8d926385b16d032b73b0d2761f0bea277c0f3e21114ff607894bba2fdf687f522f8497258eafb913a3051793961b2a9630df1ce1638ac099fcbbe4bb4537e9653456e34ae4e874533f0f85c7c37e309bfe66e6f09980728c1f63ac33c0fff107c488c10396584510d5d97119b65cc90256ba4375f7f7166c7a25dd8e1124aa1979ad320c5ff16b5638a9f2f2992ed48edb4ce9e4cf943ef03e6d7bbe52f2759915a7d1fc37ddf74f14abb56f674293e5c418edb74e0230e511a79bbbcd381a7ed2665c03f00bffd421f072e20d42dd4d93423b71c560ffa8f51c8ed45bf95aaac4218c96f33f6144751cd029c2031db4792b17122ac6a6ee81f9c63de19cfed2d23276f7ded350e624bf54ba4b531d7e50e3563530666b22d964b8a552775b8f9039a31688d91e48d42c1e8140a5ffc5f8f0e81b317a0bc624deea07c8335cd3aabdc118b2004a0f689189deb2727556238f1edd6d56662aabf3aae640f3b31c42ec4cfd9b393e62b736f2c9be98c3a8dbd96d71de43c8b504d447045c5718aff101ba69e5bcc013d9055e5538554a779a981d958d08b66e54013f7a5573b830e36c357c14894149d1d3b9048f0276457ec558aaf6bc5c6a5e68fac26c9663caf69378e7274d80cf9dc8b8db349a33ac25fe63d2dcd1a3af3b3b75923d01e18e642b19c7119e160203fa7fb710bf6e40ddc5158b32af65ab5da8bbecd0b145ae0c355db5344a411749710caf99caa6827e218f312b9e42fb9c0a50fd501ec48ea0cb6de1ef27e06b562e9545372a49f07e5219478ad51930f793d8f4eceb5457b11559d5253d763e10c1c95675f58114166be7d075e179f34fb1eeac40af9e03e88615cf4b7081dada7d6acaf12b1b2f2b810e5e4d9241c8ad7165d1313debf22d73fffc2097566cba1b68dd1f87ed498f0ee31df3a656bccfbec0a48d22bb7ecd7ee3017d025bf67dd9c803f9850eb696ca5dcffc861561ad7e077903800a3acd3fc9ee023ccd3144d082b01f3699ba853a086fde3eb9fbf57b56caffdeb3ac59570bc3c34727dc592d2d0fc11190bddb4e10e95b508e55707eb8d1a9865983e8aec24c692aff7a571217232e63960ac7faecabb8642f52bfe42cdae7b34878e8da257f3c2a7363eb0eec5e402d6c57d0db3c3341efd0d687e503f03e92d50e120be90c86eb198e4dc8bd9af8099fce83c928849ccb2cf837d7feaaf273c754478d62c5a4c5c79eb3a36b39005e2deee63ebc4536b7925b3e9323bc414cbbab69ce9796386bda16f5ccf3a6773102e3e3158f31762c5e7a4aa52330117b5a98065026951e3eb5bf4e589c73160278de0eec5c5057e42c06ea28bf09f6ada151a3e3c7f8083be9cc979f48c512c629e6143bb1a731caf1d1058cd4de0737e68abc3fa3ed2c9f52920053d18f2049564e4576ed98cb7ab67cdd98a882827a42732a10ca24729d996029298348d420cbd8494159b809c5945ee251d484b9922e8d9d3fe214f83934cd1b78bf61751b606e774bad0150e0daae9f61a12a6021bcd083eaa24dd158f2d3d0079d14afadd3b3d327971bbcec97773609b48d4c3eb8ac03e17f5ccedde375694486977598f54675d6be8e64e6c163a803a1bb58c5eccdb95420ac6d1723e989d3d85be78b3c39fe8216226c519bd2aacdc1df91cb89b3f93ceab46eed6b6f3b14fb982693907103ee209c77983204703c05dc22b405616524bca7c1d9be078454f3b03411ddcdd3b141158b4a03973efd717a02fdb9565a1437d23f8737acec6d6af465f58075999f5d9793835c2151c0f85fb1dbc823cd28786a9a26703355a69ba2089131d93e87dfc7ab88fe46de30a387c8de5a9918122f5bf4d6f6d92e6401f4bb524cb3c8a6afc152b23429487142bf4028c8b9c5820f714978bc34dccc70633cf0df971f93d3fe9d60ae625289d9479a0931bb6195730045bb66ee894e2ce3f0e3487fa7f08d37c1fd30a25a961f6e4bbe11dd219b55fbb8d74aac729562e2e9c41dbca8f688619b3deeabcf8dc316edbd994f45e78f9c0e86dfe99a6768b9e8319a0d7d21c186809be6a34639bfee0bede7d7fe66b4c4623e36e5a8db76063a4fa3eca02169f25f5434fd9aa81034fdefbd469c6b4879806561f96331a3e8ab04e19c6be945aefe9e028251109e7b6fc08d87c5bf357bd54842aa7aed330e612abad6102979d04fc72d5a5c15af924faae3d4bc0580e803955595e627f5b54ef2c46fd4c9b96126e5a7fc650243082ca1dd08f36c93db60a545347d1a01630896770e30b21bdbebfff49acc844ff2dd7e6409a7eab8469b37c1d78bd5d2ad6766e17afcba4d7dc5da19493f5ed3e6751f70e6bf8a048671f5cb4b1a1af7948aab2c8829ce9da6db9385e90e13bfc204a595a0a74b4359ba8d11beb26da173c3c0706c76dd034c89a5fd15f24ef5b5f7a0de9eeefc7e8f64631050e8cdd1348701345daebdf419ab23a2dfe94a97cecb261d5c41c0ced70a823dbed07204f8bf3a29bbc9b28db5cb1c380bc6241135b434b8dad8569db39c6a0d3d964da8c40e00319176e65cac13074db2e780c956c3678c20faccd13aa90dceb2ae4fc6e4a32c78b686fe1a0b33072c949258a1f7b307481e830c9bf9e95d92946acff7a9fead1776a85003275fbdc696f57579b33ed0ba4437a81db5025c334a41682758840e58a39087b264cf9a7ea0072f5c9a8cc200f98c2c164253bcb448ad40528e39c1d3398c6e4b5738a51f14bd5dd938bd5264f10a393fe71e98c762b67e76fcb3e33cb4337a4ae1ba68ef64488bb43c7df47cd102eadd4807f09386641f31e5984020858e7b333f8d94066ae6073c1df398de55f803b8adf0f5d014744b2c8092e8e3c653c9226915f82d0d4b9489f2b558896fa3584f9b3baa05d2722fdef9674f4136fb9adc1e4f820d5477563bb4b2f6d730f72baabeeb4aedf68e5d8604a666542d4264bf308edd0b695bbf84c3d461731421cf789b7194008fc536404cfc94a3b308c8ba9a97ebe0e4a5084b66698c35dc36ddccd970a16741832984dbddf9a7ca6eb0786c7d2fb7905ff1fa770267e315a81170b6f9242f64c7fce4aa8d5131d4c3468e3c27fbb91a4af1497e2f16cac6a5204aacfc7dda9d2ebfc0e1ce356195a425142ae6133394e70571547a18ece49fecc1e5197b3f7b3a1a391ba25e6f798c4f67a3232139d2e43705a6050926e00f9301a43558e02084de9cc6c81f20082396aa944176dfde28340d302627888a119723dcf726b7df7aed084db325c5ff4ca6a5d84039c0f82167e4d69a45ed2f327a2941825fd2f521498ac2b5e75385edeb4455e28e29d740252b512ac3c395ee103cc9b2cc9cdbdc5fb843fdfe1d3cc7ae8443b7a9a0c7b4d66cf581b56e7c09a57c5704a42977314dcd5a679b1dabc2928adfe1be544fc14d7f48426a1aa1963feb217a4be266df26d59ea37a1d6a13c31ca4bd25b9c2bd68f497b2d56fb5e15e3f789aba9023e9429a482b468d7216a947aa69c314cf13a872ffb1897a983dc1db16871a5e75fd0e5df562d3bb7d6c51509080971b47aa96b5c5dea258fca6a391ba60d769e71337c53e68d842b24f5beb394a556c9e7d5e1659192d112b41637dc92d08d8955d9f30c11363dcbc055c78dd45e78b006b2e2985422ff7c7ea2aefacc8d3bf2417534d7d16bbcb7cab66b9b7d588cab9fd5e667e5a943c4c89a598354bb2a39d236da6be3a0e8a165e107a51c2e0dae77065526d9c876dc095164ac0eebd7c12f692d0d344c2eb6a16e6c4cbd911f8a1cd6c0180503fcb14d76d517529cfb4e2ac485126af96975d0656707aff85b43d2564e9aaff178f3f398b5f8d38beb57ff8feb4f12c5589787e9cf9d6637b9e352c35a803d46023c44fe282b84bd10497f9988350f85853e849b62d58463eaabe66f785605c46e8648edd0749b5affce3448f41421610771b4234dfb9b619f1b4d85cb5f555329ee8d29a08e8b724f29b5d3d3fe58e7ac3b651568e64dd619dbf9acef3abd900487ba8c64192598562c51aa44acce4b1a9841751cd13ce02a6a45b1cfa53863c9bdb10ac0bef10b6a94f9799242f9d7b9c60e2343ad9ab2a91cbd2319dcce6c2989cae81ed717779c054d478b305936187ba673aef8af9aeb59d7adb686b1832f21de44027472bab071aea582fb767a4c5b8ff1bc3330452a6f507d8997cea732c856d421f23479b61919ddda7e7a81d5356eebecf1637d885695564f336a69bd2931dfaf3fd7b8df2d082fa8f109ff10ce657dac263769f20c6e479e0c6ba13faea2834d8a8a428a48ae43c9629da7ab0fb27ab81c56e6e72b94b3927f41886c5587a82ad7a74463cdbf672a4e13ce3a5b5911a4472abcbf40543cf3cf16e081300772d6c157e3bd69acef8c4567e947eb5cdf857c12975cc0d5cd069296e3cad4f27a90c2dea38e9b9db215b622bc9efea36fbe655447d5427adaef33e5dafa7dec360fd68e284bfee6b02f2b130c27e9ef8265f325803792b83fefef5358a2971e457e7b85eb9d3ccf0c8587f26e3ae9e839ef7fdd0f665047851d68a4ba4f14e5e98500fe6a7f0c962ae96d38a748a8a96e794e1032183d1f6ef4b446e16dee96d387ebdd3b3eb7cfb263838f99205e97ae2c6cc0f742ebf3d847adf4f6a05e354a850ec322b82cd0e359f905d5270014098aed72d5966caeecde696406ab9e9878739ba8323ed6ab7002a534aa1fe43f4735910f5137c69119f76794160a7", 0x1000}], 0x1, &(0x7f0000003b00)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x2, 0x4004) r1 = dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000003bc0)={0x0, @tick=0xff, 0x4, {0x0, 0x7}, 0x1, 0x0, 0x80}) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000003c00)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:09 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:09 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000140)={'hsr0\x00', 0x0, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:09 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="06000000", @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf254b0000000400ec00"], 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x20000094) 13:49:09 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1185.158729][ T8597] new mount options do not match the existing superblock, will be ignored [ 1185.194953][ T8602] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1185.313217][ T8602] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 1: socketpair(0x23, 0x2, 0x0, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SOUND_PCM_READ_BITS(0xffffffffffffffff, 0x80045005, &(0x7f0000000240)) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000100)={0x2, 0x0, 0x2, 0xfffb, 0x2, "eb15b4af118c9feb"}) connect$inet6(r2, &(0x7f0000000080), 0x1c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:10 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:10 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x100000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x7b) dup3(r2, r1, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x67, 0x521000) setsockopt$SO_J1939_PROMISC(r5, 0x6b, 0x2, &(0x7f00000001c0)=0x1, 0x4) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x7f, 0x4, 0x4, 0x110000, 0x6ba, {}, {0x3, 0x0, 0x16, 0x8, 0x4, 0x81, "b2ca27cf"}, 0x8000, 0x2, @planes=&(0x7f0000000040)={0x9, 0x7, @fd, 0x2}, 0x7}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) [ 1185.536502][ T8613] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1185.637240][ T8623] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:10 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1185.758534][ T8627] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000200)=0xfffffff9, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000019300)={0x30, r5, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_bond\x00'}}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2094040}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r5, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x22}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x81804}, 0xc041) 13:49:10 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x26000, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000090000082505a8a40700000000010902240001010000000904000012070103000905010200ffe00000090582021a7c"], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000740)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_disconnect(r1) syz_usb_control_io$printer(r1, &(0x7f0000000180)={0x14, &(0x7f0000000000)={0x40, 0x1, 0xa0, {0xa0, 0x2, "845013921fa8ee207580ca6c46290dc39a95aab365db8170eaad3f40de6ef5300d39c4bc20ca5b50d5ac1de56cebad6aa5dd4308db771184eb328ab28618423eba10cbfaf246787445e7537b925490a9bde5f70a089cacdd08587ae7dad3e66db4fb03cda55d27c7111ecd46de51563864011e204d9bde6233d8383c6f55f3756dde35850dbb3212f85837e82c72ac10c550e46a4e7500fb2c2a3ee07a72"}}, &(0x7f0000000140)={0x0, 0x3, 0x1e, @string={0x1e, 0x3, "ca5eb6cf728b331770ff1aeb3030c57c6eb6150f119ce32ac268bfe5"}}}, &(0x7f0000000480)={0x34, &(0x7f00000001c0)={0x60, 0x15, 0x8e, "e6539d980a1087478c20e14fc662314bdfd8a88f032985077dffdede2ceb5d07116dcfb85fad80a4b82a722404e5a464d9601ab4725073af4955396a26761f5d183ef3a0e83c8d8854c2c929a6d128866733981043f3852888f1d2a1e5f94018b63f23cb4f33dc5cd8d559424c4c5b341e004f2e39a2d13f8b3ab3cc5e9bb7127ca8b295d997c93a8ca0e96e58e2"}, &(0x7f0000000280)={0x0, 0xa, 0x1, 0x3f}, &(0x7f00000002c0)={0x0, 0x8, 0x1, 0x6}, &(0x7f0000000300)={0x20, 0x0, 0xd9, {0xd7, "812d83879baf8c9460438b74c34a70e9cc4fc38d2672d4ad2ef4a7087396108d4419fe5d4b52d198560812c41d90cb6bf2275aa5258c0c6e7508d8661bf703fdcd8d61f0f2916df509d6ed2c31f7e765a688a59260001849da546f77acdc5af798f6052ba38b7e4a73bc25371bbdd15c15b8da33189530a609ee641643ceae085a97c6c4b89ad3e49e1ad0048ab874e31ce329839879e3de62e6a94e4b3078f9760f7dbfb1fd6e24cf4a6c68edc8d439e6e15443216b861872f7089491f91e301ef0dbb59290da96b80137651ad193d0cec569c9d14373"}}, &(0x7f0000000400)={0x20, 0x1, 0x1, 0x3}, &(0x7f0000000440)={0x20, 0x0, 0x1, 0x1f}}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1185.883377][ T8639] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:10 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:10 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x58fdc1, 0x130) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) r5 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[], 0x1) dup3(r7, r6, 0x0) finit_module(r7, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)={r5, 0xa0000000, 0x80000001, r7}) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1186.106901][ T8650] new mount options do not match the existing superblock, will be ignored 13:49:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1186.255348][ T8658] new mount options do not match the existing superblock, will be ignored [ 1186.293538][ T8650] new mount options do not match the existing superblock, will be ignored 13:49:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:11 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:11 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000180)={0x3, [0x0, 0x0, 0x0]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r4}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1186.342043][ T2581] usb 5-1: new high-speed USB device number 2 using dummy_hcd 13:49:11 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:11 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:11 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1186.582871][ T2581] usb 5-1: Using ep0 maxpacket: 8 [ 1186.589371][ T8678] new mount options do not match the existing superblock, will be ignored [ 1186.616720][ T8679] new mount options do not match the existing superblock, will be ignored 13:49:11 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101040, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000100)={0x4}) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "00000408", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r3}, {r2, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1186.722176][ T2581] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 1186.749159][ T8678] new mount options do not match the existing superblock, will be ignored [ 1186.770696][ T2581] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1186.807163][ T2581] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1050, setting to 1024 [ 1186.839027][ T2581] usb 5-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1186.902371][ T2581] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1186.941675][ T2581] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.07 [ 1186.974391][ T2581] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1187.012718][ T8651] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1187.020020][ T8651] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1187.032808][ T2581] hub 5-1:1.0: bad descriptor, ignoring hub [ 1187.039367][ T2581] hub: probe of 5-1:1.0 failed with error -5 [ 1187.243660][ T8651] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1187.250929][ T8651] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1187.536417][ T2581] usblp 5-1:1.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 1187.610725][ T2581] usb 5-1: USB disconnect, device number 2 [ 1187.643199][ T2581] usblp0: removed [ 1188.531068][ T2946] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 1188.771054][ T2946] usb 5-1: Using ep0 maxpacket: 8 13:49:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000000)=0x6) socket$nl_route(0x10, 0x3, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)=0x3) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x101000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x0}) finit_module(r2, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r3 = dup3(0xffffffffffffffff, r2, 0x80000) faccessat2(r3, &(0x7f0000000000)='./file0\x00', 0x4, 0x200) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000080)={0x0, 0x8, 0x8, 0xaa2, 0x6, 0x4, 0x7ff, 0x3, 0x3ff, 0x6, 0x3f, 0x10001}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000180)={0x1, 0x7}, 0x2) 13:49:13 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000200)={0x401, 0x0, 0x80, 0x3, 0x4}, 0xc) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:13 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:13 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0xffffffffffffffb5) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x20003, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x101, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "12150300", "f6451800751f101141a800ec48c21f064dbf53e6610000a00000005b7f00", "bf599772", "73b278a5beb5532e"}, 0x38) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x20001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000000000000a004e200000800000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000030000000a004e23ffff0001ff010000000000000000000000000001ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000003f00000000000000000000fff7ac1414aa0080ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22000000fffe8000000000000000000000000000bbff00"/525], 0x210) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:13 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x0, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1188.891096][ T2946] usb 5-1: device descriptor read/all, error -71 13:49:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1188.987790][ T27] kauditd_printk_skb: 48 callbacks suppressed [ 1188.987803][ T27] audit: type=1804 audit(1594734553.764:992): pid=8731 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1684/bus" dev="sda1" ino=16332 res=1 [ 1189.079015][ T8739] new mount options do not match the existing superblock, will be ignored [ 1189.100217][ T27] audit: type=1804 audit(1594734553.834:993): pid=8731 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1684/bus" dev="sda1" ino=16332 res=1 13:49:13 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x0, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:13 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000000c0)=0xffff) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:13 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xffffffffffff18da, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x200000000) [ 1189.147409][ T27] audit: type=1804 audit(1594734553.844:994): pid=8741 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1303/bus" dev="sda1" ino=16342 res=1 13:49:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:14 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) getpeername$ax25(r2, &(0x7f0000000040)={{0x3, @default}, [@rose, @null, @null, @default, @bcast, @null, @default, @rose]}, &(0x7f0000000140)=0x48) finit_module(r1, 0x0, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000000)) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000180)={{0x1, 0x0, @identifier="09cb1cd90524883cbe94b6850cd3afe1"}}) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1189.269442][ T8739] new mount options do not match the existing superblock, will be ignored 13:49:14 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8bc, 0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x44, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:lirc_device_t:s0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x200440d4) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1189.347582][ T27] audit: type=1804 audit(1594734553.854:995): pid=8736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1303/bus" dev="sda1" ino=16342 res=1 [ 1189.377235][ T8756] new mount options do not match the existing superblock, will be ignored 13:49:14 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) [ 1189.457525][ T27] audit: type=1804 audit(1594734553.924:996): pid=8736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1303/bus" dev="sda1" ino=16342 res=1 13:49:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:14 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x0, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) sendmmsg$inet(r1, &(0x7f0000002340)=[{{&(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000540)=[{&(0x7f00000001c0)="80", 0x1}], 0x1}}, {{&(0x7f00000006c0)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000340)='j', 0x1}], 0x1}}], 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x8000000) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000000)={'security\x00', 0x24, "2b5d277be4aabb85628437b5f9f205131cb62a3e08516505a9e1d415b6bb5997305935fa"}, &(0x7f0000000080)=0x48) [ 1189.605589][ T27] audit: type=1804 audit(1594734554.154:997): pid=8759 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1685/bus" dev="sda1" ino=16342 res=1 [ 1189.669884][ T8783] new mount options do not match the existing superblock, will be ignored 13:49:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) 13:49:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001600)='TIPCv2\x00') r3 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='.\x00', 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000380)={r3, 0x12, 0xeb}, &(0x7f00000003c0)=ANY=[], &(0x7f0000000440)="60bfe88e25a8e65d39dbb2be04e3769b11fc", &(0x7f0000000600)=""/235) add_key$fscrypt_provisioning(&(0x7f0000001c80)='fscrypt-provisioning\x00', &(0x7f0000001cc0)={'syz', 0x1}, &(0x7f0000001d00)={0x2, 0x0, "6fd203bd19aed4cd35eeb014af1617c00ebd1222e7c979a9818d539eddd0c518c4"}, 0x29, r3) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001d40)={0x118, r2, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xcb88}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x100}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x855a}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7fffffff}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) readv(r1, &(0x7f00000019c0)=[{&(0x7f0000000040)=""/66, 0x42}, {&(0x7f0000001580)=""/127, 0x7f}, {&(0x7f00000001c0)=""/211, 0xd3}, {&(0x7f00000002c0)=""/224, 0xe0}, {&(0x7f00000003c0)=""/45, 0x2d}, {&(0x7f0000000400)=""/34, 0x22}, {&(0x7f0000000440)=""/37, 0x25}, {&(0x7f0000000480)=""/4082, 0xff2}, {&(0x7f0000001480)=""/194, 0xc2}, {&(0x7f0000001640)=""/232, 0xe8}, {&(0x7f0000001740)=""/66, 0x42}, {&(0x7f00000017c0)=""/10, 0xa}, {&(0x7f0000001800)=""/140, 0x8c}, {&(0x7f0000001ac0)=""/66, 0x42}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000001940)=""/126, 0x7e}], 0x10) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1189.772201][ T8785] new mount options do not match the existing superblock, will be ignored [ 1189.790507][ T27] audit: type=1804 audit(1594734554.264:998): pid=8759 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1685/bus" dev="sda1" ino=16342 res=1 [ 1189.839991][ T8778] new mount options do not match the existing superblock, will be ignored 13:49:14 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x0, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:14 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x40, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1189.915160][ T27] audit: type=1804 audit(1594734554.294:999): pid=8768 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1304/bus" dev="sda1" ino=16329 res=1 13:49:14 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = semget$private(0x0, 0x2000000010a, 0x0) semop(r1, &(0x7f00000001c0)=[{0x0, 0xfffffffffffefffc}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$SEM_STAT_ANY(r1, 0x6, 0x14, &(0x7f0000000140)=""/246) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1190.094683][ T27] audit: type=1804 audit(1594734554.324:1000): pid=8768 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1304/bus" dev="sda1" ino=16329 res=1 [ 1190.145830][ T8814] new mount options do not match the existing superblock, will be ignored [ 1190.201109][ T8811] new mount options do not match the existing superblock, will be ignored [ 1190.208386][ T27] audit: type=1804 audit(1594734554.344:1001): pid=8768 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1304/bus" dev="sda1" ino=16329 res=1 13:49:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4c004, 0x0) mmap$dsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x40010, r3, 0x0) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) signalfd(r2, &(0x7f0000000000)={[0x401]}, 0x8) 13:49:15 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x0, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000180)={0x2, 0x0, [{0xce}, {}]}) [ 1190.316407][ T8817] new mount options do not match the existing superblock, will be ignored 13:49:15 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x6, 0x6, 0x2, 0xffff, 0x5, 0x8, 0x3559, 0x1, r4}, 0x20) r5 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000080)={0x7fffffff, 0x3}) r4 = open(&(0x7f0000000140)='./bus/file0\x00', 0x131282, 0x272) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r1, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) [ 1190.557174][ T8832] new mount options do not match the existing superblock, will be ignored 13:49:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) dup2(r2, r0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000040)=""/69) 13:49:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, 0x0) 13:49:15 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x0, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1190.653648][ T8845] new mount options do not match the existing superblock, will be ignored 13:49:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) accept$netrom(r2, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, 0x0) 13:49:15 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) getresuid(&(0x7f0000000080), &(0x7f0000000100)=0x0, &(0x7f0000000140)) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x6, 0x7fff}, {0x864, 0x400}], r2}, 0x18, 0x3) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000040)=0x1d) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x240, 0x181) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) r6 = dup2(0xffffffffffffffff, r5) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f00000001c0)=""/23, 0x1000, 0x1800, 0x3, 0x1}, 0x20) [ 1190.888126][ T8856] new mount options do not match the existing superblock, will be ignored 13:49:15 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, 0x0) 13:49:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x248100, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="80ae864c2d68bb1334d543bc57a164b8c24b3c60f38856f64897340873c48d4857fcdf97d89b5a58298bfe9a584dacce4da0fb2165b2b6d2344d"], &(0x7f0000000080)=0x8) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:15 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRES16=r5, @ANYRESHEX], 0x1c}, 0x1, 0x0, 0x0, 0x14004004}, 0x8084) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r5, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20040884) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) fcntl$dupfd(r4, 0x0, r6) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ioctl$int_out(r4, 0x2, &(0x7f0000000140)) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0xffffffffffffffc6) [ 1191.310415][ T8875] new mount options do not match the existing superblock, will be ignored [ 1191.441079][ T8891] new mount options do not match the existing superblock, will be ignored 13:49:16 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000140)={0x1, 0x3, 0x1000, 0x1e, &(0x7f0000000040)="c1fcea4d327d19746283a54cab67f2f9e3d683b81e249b5f2a3f7ec0de42", 0x2f, 0x0, &(0x7f0000000080)="9f1d38244e85e07a00fcacedb924cb765a4c7ec238ed1f732ef1d55f995121b9d8243ab3e5417cb15a8ab3a22ba724"}) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:16 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000000)=0x1, 0x4) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{0xce}]}) 13:49:16 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:16 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000200)={0x0, 0x7, 0x4, 0x18, &(0x7f0000ffc000/0x3000)=nil}) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x41) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0)="82d58b5a4027e8a250eddc744cbf2f1787efb0b2992c043e4af23a683a4c660f0454f97b26f58147f3b3ff396f42e9ab43cbad714e7c274fa1b62741c84b53aa5d4c16146fa2fc9596cf6467d181eae11f1ab1f9ef8dfa2be7b53f03927783f6ed5cfd6aba8eee3bf07ac33bd6e66ed839970bd87273007687826e5e1fef6189806101f0774813c35df57858a7ef52e70e6229d8793e3a6ae7b3eb4c56551909f6ac1fd5713835d4beeac109da7ca394b99b9e908e84deff07b8a0ead598d78e5bf6491d4acddfbed615f98886cad038d3aed2dd835475d17c1c17dbd4be8bfb79a7cf367bafcd70f60b24680e59a9b57b43889880845e0b", 0xf8, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x23}, 0x4}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:16 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x1, 0xa, 0x2) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffffdb) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) read(r2, &(0x7f0000000200), 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)) 13:49:16 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x80840, 0x62) finit_module(r4, 0x0, 0x0) accept$packet(r1, &(0x7f0000000a40)={0x11, 0x0, 0x0}, &(0x7f0000000a80)=0x14) bind$can_j1939(r4, &(0x7f0000000ac0)={0x1d, r5, 0x2, {0x1, 0x0, 0x3}, 0xfd}, 0x18) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1191.760369][ T8903] new mount options do not match the existing superblock, will be ignored 13:49:16 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1f) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:16 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000000)) [ 1191.856795][ T8916] new mount options do not match the existing superblock, will be ignored 13:49:16 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1191.970441][ T8921] new mount options do not match the existing superblock, will be ignored 13:49:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)) 13:49:16 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x14c9, @private2, 0x1}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "0100002d", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:16 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000)=0x8000000000000000, 0x8) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x40) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) ioprio_get$pid(0x3, r5) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 13:49:17 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0x73) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200), &(0x7f0000000240)=0x8) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1192.185971][ T8939] new mount options do not match the existing superblock, will be ignored 13:49:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)) 13:49:17 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x32c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000180)) keyctl$chown(0x4, r3, r4, 0x0) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x0, 0x5}, {0x400, 0x3}], r4}, 0x18, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000280)='./bus\x00', 0x640003, 0x20) faccessat2(r1, &(0x7f00000002c0)='./bus\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e24, 0x6, @loopback, 0x5}, {0xa, 0x4e23, 0x21, @empty, 0xbe}, 0xfa17, [0x1, 0x7, 0x1, 0x5, 0xffff, 0x6, 0x5fc22138, 0x80000000]}, 0x5c) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/100) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='\x00') write$qrtrtun(r3, &(0x7f0000000140)="211875b775af045002862046d5fa5e553f805c6e3af7478f693efc81e17c75683c022742b3b0c8aaff7a3aa7a99b6f11d6b648c2563406ab8ed1a369401c68b0b433aad6575e5d87e15b3ea5c42f8784c33e55addc742ca989d490cdd95f0f06dd08d31eb6bd7cc591a2aec1214d7910d37d8f4f55", 0x75) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:17 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000140)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0xe00000}) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000180)) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x1d) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') [ 1192.489873][ T8957] new mount options do not match the existing superblock, will be ignored 13:49:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{}]}) [ 1192.598628][ T8970] new mount options do not match the existing superblock, will be ignored [ 1192.643779][ T8979] new mount options do not match the existing superblock, will be ignored 13:49:17 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x32c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) socket$inet6(0xa, 0xa, 0x6) r3 = socket$inet6(0xa, 0x2, 0x5bd76d10) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x9, @loopback, 0xffffffc0}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x3f, &(0x7f0000000100)=0x7, 0x4) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:17 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x9, @link='broadcast-link\x00'}}}, ["", "", "", "", ""]}, 0x68}}, 0x220040c0) socket(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000003c0)='./file1\x00', 0x42) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:17 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000000)) 13:49:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{}]}) 13:49:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x1d) [ 1192.963517][ T8996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8996 comm=syz-executor.0 [ 1193.020773][ T9001] new mount options do not match the existing superblock, will be ignored 13:49:18 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x4000) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1193.187715][ T9008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9008 comm=syz-executor.0 13:49:18 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x2}, 0x6) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) 13:49:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [{}]}) 13:49:18 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x32c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1193.246576][ T9017] new mount options do not match the existing superblock, will be ignored 13:49:18 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x101, 0x101002) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000180)) prctl$PR_GET_TIMERSLACK(0x1e) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) accept$netrom(r3, &(0x7f0000000280)={{0x3, @rose}, [@default, @netrom, @null, @default, @bcast, @rose, @null, @default]}, &(0x7f0000000080)=0xffffffffffffff9b) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r1, 0x0) finit_module(r4, 0x0, 0x0) semctl$GETPID(0xffffffffffffffff, 0x4, 0xb, &(0x7f0000000240)=""/49) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:18 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffffffffffda, 0x2}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1193.459571][ T9034] new mount options do not match the existing superblock, will be ignored 13:49:18 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) 13:49:18 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x324, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x324}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) r3 = pidfd_getfd(r1, r0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1193.638162][ T9041] new mount options do not match the existing superblock, will be ignored 13:49:18 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000280)=0x10000, 0x4) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="6f31e549761719cf76033d7d86d9115afdf38c0be98a4993bbe7d6f206039434f59eb19ec8d2dd13a80994a73e27403cd06efe3ccdfb9095d1f6f38b983d345c3de7c944a7df9db5055a95643567373825863b835bf69cb1ae8d75536e04a2a442986d1c555ca2d679264d5c0ed421732060845242cdf9536cb2bcf01f0e763d62621400e6e0a1a460b9b97d76ccfb1a3b433c4d50635ac2f9b6107ebf4d42459d835099589a03c225619c2dba702e9a42e4289998cc9e7e5965151e06985a3e57ac6da674eee558b71963d4495db9b059acad97a2ae74aa87f18245e6156cb3b1dcf4af77c5797772edf4bd3c27c521888f98add4aa7ca2b7", @ANYRES32=r1], 0x1) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000180)) keyctl$chown(0x4, r2, r3, 0x0) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) dup3(r1, r0, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0xfffffffffffffffc) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000019300)={0x30, 0x0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_bond\x00'}}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000840)={&(0x7f0000000540)={0x2d0, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NODE={0x78, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x69, 0x3, "41c3835da9fe9c61232ef3ff131a063f3d5879f3e414f244ba8f83d418e140f2f5bb5a17b65790ae8b537620d64cecfd07f340c372ff3678e9c89cd873bb7d4a646357ad7e1b301c4546b4fbf55940581f2325ea0f315ff532e09062930691749a52c325ec"}]}, @TIPC_NLA_NODE={0x1b0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "7924a43c53daeaf4d34980654dd79fadfe7ef443aa95e748783aa38181c315013939"}}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "9c0c1547a7de1e33d4501e13615b255c59b8c6daf370"}}, @TIPC_NLA_NODE_ID={0x3c, 0x3, "b068e81997e4ad6c3879cb8eda7f9431c82c51d5149a600ce822c6cbfcbfc83c26085d5e31c9d9a63b7ff3728d35d6fca468e797721ab2c7"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x9c, 0x3, "81c3ca5bfee4b992b4fe00848a7f21c0aa6c0ba3cb6a6abc42c914450b20bf4852ff0f9bb5b58ff99ccb5595366c086fab62be394bab84ea2aaa9d39d6e9bf721a913042c03028ab14f2be52e88208e41e9d914de7a38ca90d8e6ab2c146b83b0331577c7e4b4dc22581f08ea7a2658feed3dc6b799f82e1a67f109e33dd14f692b47f30c4f8ba2c8337023fa22c4f7baecf7843a5295c53"}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "100c826cd309b7b0c7c39c7f45ed65c085761de045e2eac57a2975"}}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x68}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x34}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x80}, 0x80c0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) fstat(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='bpf\x00', 0x40002, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x4}}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r7}}, {@obj_type={'obj_type'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@seclabel='seclabel'}]}) ioctl$VHOST_SET_FEATURES(r4, 0x8008af26, &(0x7f0000000100)) [ 1193.741700][ T9050] new mount options do not match the existing superblock, will be ignored [ 1193.793304][ T9047] new mount options do not match the existing superblock, will be ignored 13:49:18 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0xe0, 0x0, 0x3, 0x0, 0x7, 0x8a0, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x20, 0x2, 0x8, 0x5, 0x5, 0x8000, 0xacac}, r1, 0xc, 0xffffffffffffffff, 0x2) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x470}}, 0x4000000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x4000000) [ 1194.017664][ T27] kauditd_printk_skb: 68 callbacks suppressed [ 1194.017677][ T27] audit: type=1804 audit(1594734558.794:1070): pid=9060 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1697/bus" dev="sda1" ino=16345 res=1 [ 1194.197843][ T27] audit: type=1804 audit(1594734558.844:1071): pid=9055 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1697/bus" dev="sda1" ino=16345 res=1 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:19 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x324, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x324}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) writev(r1, &(0x7f0000001240)=[{&(0x7f0000000140)="d175826e7a82d05a34be04a57887e293c63639fb46c67e79748fc9c14674dac98827d16a4d1ed129727749dda219d8e873a4d810d772068f0371354d028340193887f102b96553ff708290baefdb3992b1fba7e74e56dc39687cced2cdc5d452e11b8328cf95ccfffad26e086bef4210c8f3036a27d1167a497c4a38893fd878570805ce986d5ee69e1c45f6e51997ce95a82825b306b71e6ef508ce979f2727c54f6eabf5ac9abbf627dfe55ee700b7799f98b84d50ece7f27abd3d00c17eac3c290ae45a76bae8eedc75bc78ff57b5f6101caec764808102cc80cfd280152f881d541605b5ff3afb53", 0xea}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000040)="3c7afb489f81c0efddc463fd36030db81afc82f8448367802cd4f3414fd5c6c46eaaadaded0286d85a898b7d343115944b4ba715937b87f27fe314b392972deda638fad43125e14311d2c2aacd", 0x4d}], 0x3) 13:49:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0xe9) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000080)) 13:49:19 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r1, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}]}, 0x1c}, 0x1, 0x0, 0x0, 0xfb43f7cd14686f36}, 0x50) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1194.330698][ T27] audit: type=1804 audit(1594734558.844:1072): pid=9061 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1697/bus" dev="sda1" ino=16345 res=1 [ 1194.413317][ T9071] new mount options do not match the existing superblock, will be ignored [ 1194.413733][ T9080] IPVS: Error connecting to the multicast addr 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xffffffffffffffff, 0x0, 0x53) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101402, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0x2, 0x0, 0x400, 0x7a64, 0x7fffffff, 0x7ff, 0x8}}) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={0x0, 0x41c}}, 0x208c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0xd) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x15) [ 1194.522499][ T9085] new mount options do not match the existing superblock, will be ignored 13:49:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:19 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x324, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x324}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1194.666047][ T9092] IPVS: Error connecting to the multicast addr [ 1194.697292][ T9080] new mount options do not match the existing superblock, will be ignored 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', r4}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty, 0xfffffffd}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1194.827015][ T9109] new mount options do not match the existing superblock, will be ignored 13:49:19 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x328, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x328}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:19 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x4) 13:49:19 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/148) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0xe4d8, 0x0, 0x0, 0x0, 0x800000, 0x0, 0xf9a3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x2000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) r3 = dup3(r2, r1, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r8 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000240)=ANY=[], 0x1) dup3(r8, r7, 0x0) finit_module(r8, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)={0x5, 0x400, 0x4, 0x0, 0x0, [{{r3}, 0x3}, {{r2}, 0x3}, {{r5}, 0x101}, {{r8}}]}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000000c0)=""/146) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "ff0722986840e7df", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", '\x00', "73b278a5beb5532e"}, 0x37) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1195.408041][ T27] audit: type=1804 audit(1594734560.184:1073): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 13:49:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) [ 1195.523294][ T9224] new mount options do not match the existing superblock, will be ignored 13:49:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x20200) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x9ca, 0x7, 0x80000000, 0x2, 0x4}) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000004001b0d317dd32ca39c5bd24948293c34711fd3cf4649cb36a12c0a98c226a4888b48fd77f0303f3aa518a6969dba9473b1431a7eb0", @ANYRES16=r5, @ANYBLOB="00042dbd7000ffdbdf250a0000000800060006000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 1195.558642][ T27] audit: type=1804 audit(1594734560.194:1074): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 [ 1195.586679][ T9228] new mount options do not match the existing superblock, will be ignored [ 1195.714435][ T9256] new mount options do not match the existing superblock, will be ignored 13:49:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)='\\^}:-[\x1f.~\x00') 13:49:20 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x328, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x328}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:20 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x140e, 0x20, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000090}, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:20 executing program 1: setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb740009e41db339dd2e6f1f608d9ace68068b09ae705a3f3fb8f265f25aad94552bca29dd5c0e3d6ef32c7c2c3b8d6ad81da21ffe25f8589716a61870d8571534e86804209149547ca62d6b1249046098fe9f583b5a54f39a41b0f52cd012520c55e7085f5f0836e8155a56273ac0100127c0"], 0x74, 0x1) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0xfffc, 0x0, @remote, 0x3}, 0xd) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1195.759322][ T27] audit: type=1804 audit(1594734560.204:1075): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 13:49:20 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1195.907760][ T27] audit: type=1804 audit(1594734560.204:1076): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 13:49:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000140)='htcp\x00', 0x5) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f00000000c0)=0x4000) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) [ 1196.020465][ T27] audit: type=1804 audit(1594734560.214:1077): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 [ 1196.023870][ T9273] (syz-executor.3,9273,1):ocfs2_parse_options:1467 ERROR: Unrecognized mount option "\^}:-[.~" or missing value 13:49:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 1196.103776][ T9282] new mount options do not match the existing superblock, will be ignored 13:49:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x4000000) [ 1196.207642][ T27] audit: type=1804 audit(1594734560.294:1078): pid=9242 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 13:49:21 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x328, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x9, 0x0, 0x40}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x328}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1196.253061][ T9278] new mount options do not match the existing superblock, will be ignored [ 1196.293195][ T9273] (syz-executor.3,9273,0):ocfs2_fill_super:1190 ERROR: status = -22 13:49:21 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x30, r3, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @empty}}]}, 0x30}}, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r3, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5}]}, 0x30}}, 0x4004090) [ 1196.351802][ T27] audit: type=1804 audit(1594734560.324:1079): pid=9219 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1319/bus" dev="sda1" ino=16339 res=1 13:49:21 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) sendmsg$AUDIT_GET(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3e8, 0x100, 0x70bd2d, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x404c844) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xa0, 0x3, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x5}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_SYN_RECV={0x8, 0x2, 0x1, 0x0, 0x29b9}, @CTA_TIMEOUT_TCP_LAST_ACK={0x8, 0x6, 0x1, 0x0, 0x1ff}]}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_RETRANS={0x8, 0xa, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_TCP_SYN_RECV={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_TCP_ESTABLISHED={0x8}, @CTA_TIMEOUT_TCP_LAST_ACK={0x8, 0x6, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_TCP_UNACK={0x8, 0xb, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8, 0x5, 0x1, 0x0, 0x2}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x20}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x95d}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x84891}, 0x800) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x5}, 0x1e) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0)="8d27b1a4e1a7c8ad03c9d24449c29b7aad66fc3677c9252e93a2ce37f628c5caf9e74086334c3aa588083c8b1ad5133cfb869523e77636ee9f1a2e501f6bbc3e9ba8316b329bf52f1cd3a54a64916952e82ec4792affd1387465e3c02d90eeffbea9922df718d6cf371267316986c473d7fa91d60ffe86f156ea9ce3674e1ee7b34425588f28f3092d3871eda1ce656c45377df4", 0x94, 0x0, &(0x7f0000000280)={0xa, 0x4e23, 0x4, @private0, 0x5}, 0x1c) 13:49:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c040000", @ANYBLOB="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"], 0x41c}, 0x1, 0x0, 0x0, 0x81}, 0x208c) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000000)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0xd) r5 = fcntl$dupfd(r4, 0x0, r2) syz_kvm_setup_cpu$x86(r5, r1, &(0x7f000002f000/0x18000)=nil, 0x0, 0x7, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x15) 13:49:21 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x8000000) 13:49:21 executing program 5: socket$rds(0x15, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000043c0)=[{{&(0x7f0000000000)=@caif=@dgm, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f00000001c0)=""/4096, 0x1000}], 0x2}, 0x88}, {{&(0x7f00000011c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001240)=""/225, 0xe1}], 0x1, &(0x7f0000001380)=""/88, 0x58}, 0x401}, {{&(0x7f0000001400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000004600)=""/90, 0x5a}], 0x1, &(0x7f0000001540)=""/112, 0x70}, 0x380}, {{&(0x7f00000015c0)=@ethernet, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001640)=""/76, 0x4c}, {&(0x7f00000016c0)=""/27, 0x1b}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001800)=""/141, 0x8d}, {&(0x7f00000018c0)=""/214, 0xd6}, {&(0x7f00000019c0)=""/119, 0x77}, {&(0x7f0000001a40)=""/108, 0x6c}], 0x7, &(0x7f0000001b40)=""/24, 0x18}, 0x7}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000001b80)=""/115, 0x73}, {&(0x7f0000001c00)=""/60, 0x3c}, {&(0x7f0000001c40)=""/79, 0x4f}, {&(0x7f0000001cc0)=""/104, 0x68}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/57, 0x39}], 0x6, &(0x7f0000002e00)=""/15, 0xf}, 0xff}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000002e40)=""/154, 0x9a}, {&(0x7f0000002f00)=""/87, 0x57}, {&(0x7f0000002f80)=""/155, 0x9b}, {&(0x7f0000003040)=""/201, 0xc9}, {&(0x7f0000003140)=""/4096, 0x1000}, {&(0x7f0000004140)=""/173, 0xad}, {&(0x7f0000004200)=""/28, 0x1c}, {&(0x7f0000004240)=""/121, 0x79}], 0x8, &(0x7f0000004340)=""/113, 0x71}, 0x480}], 0x6, 0x100, 0x0) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000004540), &(0x7f0000004580)=0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x8008af26, &(0x7f0000000100)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/capi/capi20\x00', 0x6240, 0x0) [ 1196.502140][ T9296] new mount options do not match the existing superblock, will be ignored 13:49:21 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x2e0, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1196.702367][ T9306] new mount options do not match the existing superblock, will be ignored 13:49:21 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f0000000140)) finit_module(r4, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000000c0)={'ipvlan1\x00', 0xc00}) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$sock(r2, &(0x7f00000001c0)={&(0x7f0000000040)=@in6={0x2, 0x4e24, 0x0, @private0}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@timestamping={{0x14}}], 0x18}, 0x0) 13:49:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x17) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:21 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x420003, 0xb2) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000040)=0x100000000) [ 1196.855079][ T9306] new mount options do not match the existing superblock, will be ignored [ 1196.994057][ T9324] new mount options do not match the existing superblock, will be ignored 13:49:21 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) gettid() sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x800000020005491d, 0x800007f, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000080)={0x5, &(0x7f00000001c0)=[{0xffe1}, {0x1, 0x5, 0x0, 0xf5}, {0x0, 0x8, 0xff, 0x9d2c}, {0x0, 0x53, 0x47}, {0xfffb, 0x0, 0x80}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 13:49:21 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000140)) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x7fffffff, 0x8, 0xffffffc1, 0x100, 0x90a, 0x10000, 0x40}) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x8008af26, &(0x7f0000000100)) 13:49:22 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x2e0, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:22 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88004020}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303}, "1a9e8b0b10abfa1f", "f6d3933a611d019cdb075d50458aa1771f100d41a89eec48c21f064d686f368a", "bf599772", "73b278a5beb5532e"}, 0x38) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x1, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) finit_module(r6, 0x0, 0x0) connect$vsock_stream(r6, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @host}, 0x10) ppoll(&(0x7f0000000000)=[{r2}, {r1, 0x301d}], 0x2, 0x0, 0x0, 0x0) 13:49:22 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x4, 0x8000a, 0x91) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="2f22ad60d34f7c9e0c85f00565d76483cddee4d58acc6ebcf527fadf296615dd6c5e5dfb881c55a95434ff5591584feb3cd4143bf8d6642de62f845eded899a21b791c11db56213f62c546b6b0a77cfd7fdfaa3247f496c0dbf3103615756bbf7e881071288d3df09092eef16d5ad78285958d991093955ab964ffc94112da8ba47230044010144e3805750dbc1ad2cc2f27095aa542b28b9f9e5f75db2cab4d43f9624b810558154f6759f158318634c1f34083f32525c644fea9fe9143de808e0fe575a99baa783afc030487eba251", @ANYRES16=r0, @ANYRESDEC, @ANYRES16, @ANYRES32=r1], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000200)={0xd8d, 0x8, 0x7}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$cdc_ecm(0x4, 0x154, &(0x7f0000000500)={{0x12, 0x1, 0x310, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x142, 0x1, 0x1, 0x2, 0x60, 0x58, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x2, 0x6, 0x0, 0x20, {{0xa, 0x24, 0x6, 0x0, 0x0, "80d7f97d8c"}, {0x5, 0x24, 0x0, 0x9}, {0xd, 0x24, 0xf, 0x1, 0x65a, 0x3, 0x5, 0xdd}, [@mbim_extended={0x8, 0x24, 0x1c, 0x3, 0xeb, 0x8}, @mdlm_detail={0xde, 0x24, 0x13, 0xad, "7c01a89d6249f88fb82ea712eecddd5abae5f4072ddd32549123df3af49448b6def9e4dfea489c46e20c549480823fd891f693c01257c2012fa04eef7c9d9255fe961740fb60f0e21c6d4212aff1d1551dbb7bda6dea646e95e2876e725af766f00285b72a462d5ad0010023dde04e8d777d19bbf25fcca8f9318ef51b477837d5702077c6d235d13f14e25d8b12152261e18ac205ac05d43c1af5c3c930c4b8f99d6e1a795b61d4eea8853b142542ce7f03601f102737507d7e430b5fca8683e89e2fb1ff31d82ef16152337d89bda3f8df12b5d26832efebdb"}, @acm={0x4, 0x24, 0x2, 0xf}, @obex={0x5, 0x24, 0x15, 0x2}, @obex={0x5, 0x24, 0x15, 0xd29}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0x4}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x200, 0x56, 0x1f, 0x81}}], {{0x9, 0x5, 0x82, 0x2, 0x400, 0x24, 0x5}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x8, 0xc0, 0x9}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f0000000240)={0xa, 0x6, 0x200, 0x4, 0x0, 0xff, 0x8, 0xe6}, 0x9e, &(0x7f00000002c0)={0x5, 0xf, 0x9e, 0x3, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x6, 0x1, 0x5, 0x1000}, @generic={0x85, 0x10, 0xa, "2cd403a1d864409fb5b777f5125ede32126fe680913671c98feef2d8dddcece6c4bf90448b716c47bbf07a2f5b9988cc389f271c9ebbb2d266af8986aee12dfdae628c863def532b55df6329ec5529168a99c506e73d49087cc988ecbe0b67b7841cf94cedbfd3873a3aaae25ff155055552fff496647dbd6dafa9c7ae0ffdfac87d"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x58, 0x3b, 0xbcd7}]}, 0x8, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x380a}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x405}}, {0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x408}}, {0x3a, &(0x7f00000006c0)=ANY=[@ANYBLOB="3a039fb840c508a0bbc518da7ca1ff3995bdbe4201e33f1989c7ad8d9888fdd8a19a01ca08f6e3e5af94c6012828843b7a17dfd06fe7f62157b0"]}, {0x4, &(0x7f0000000700)=@lang_id={0x4, 0x3, 0x441}}, {0x91, &(0x7f0000000740)=@string={0x91, 0x3, "bd226c2edf33364cc6cf1fadeee34be151a485d61e74b9dad8bcc346dd6833b74d642cd99caf962b3a32c11d945c29b5358b831e48f2722cbc4bf6e8f09a7059be8ac144d29bc5aeeb48b6bd4d699bd9af240e89e5fa907bc3d271a871b7ec39dbbb8de3b65889d089b1395c5dd0228112fa9efbd94da6601b29b5ca8b18d122fbbf9ec926391cb82f630662a05a81"}}, {0x4, &(0x7f0000000800)=@lang_id={0x4, 0x3, 0xe05}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x1409}}]}) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) setregid(0x0, 0x0) 13:49:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00') ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1197.362517][ T9350] NFS: Device name not specified [ 1197.412854][ T9352] new mount options do not match the existing superblock, will be ignored [ 1197.444116][ T9349] new mount options do not match the existing superblock, will be ignored 13:49:22 executing program 1: [ 1197.470689][ T9363] NFS: Device name not specified 13:49:22 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)=0x1d) 13:49:22 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x2e0, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:22 executing program 3: 13:49:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x424100, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x645, 0x400, 0x1, 0x6, 0x20, 0x9, 0x5d01, 0x7fffffff, 0x8, 0x1, 0x9, 0x0, 0x6, 0x0, 0x8001, 0x8c2, 0x9, 0x7, 0x9, 0x0, 0x1, 0x0, 0x3, 0x1000, 0x400, 0x7, 0x2, 0x1, 0x9, 0x1400000, 0x3ff, 0x9]}) r2 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='.\x00', 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000380)={r2, 0x12, 0xeb}, &(0x7f00000003c0)=ANY=[], &(0x7f0000000440)="60bfe88e25a8e65d39dbb2be04e3769b11fc", &(0x7f0000000600)=""/235) keyctl$invalidate(0x15, r2) 13:49:22 executing program 1: 13:49:22 executing program 3: keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) 13:49:22 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) socket$inet(0x2, 0x2, 0x6) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000002c0)=""/231) r4 = dup3(r1, r0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) bind$unix(r5, &(0x7f0000000240)=@file={0x1, './bus\x00'}, 0x6e) ioctl$USBDEVFS_GETDRIVER(r0, 0x41045508, &(0x7f0000000100)={0x7ff, "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"}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000003c0)=0xad, 0x4) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x1}) ioctl$VHOST_SET_FEATURES(r6, 0x8008af26, &(0x7f0000000000)) 13:49:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000a00)=0x1f, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xa808) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x10001, @loopback, 0x7}}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000a40)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 1197.773230][ T9372] new mount options do not match the existing superblock, will be ignored 13:49:22 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1198.090008][ T9352] new mount options do not match the existing superblock, will be ignored 13:49:23 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r0 = dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @mcast2, 0xc8d3}, {0xa, 0x4e21, 0x80000000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1904}, r1, 0x80000000}}, 0x48) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000001c0)={r5, 0x6, &(0x7f0000000040)=[0x1ff, 0xdeac, 0x4, 0x0, 0x3, 0x3], &(0x7f0000000080)=[0x40, 0xff], 0x30, 0x3, 0x7, &(0x7f0000000140)=[0x3, 0x9, 0x20], &(0x7f0000000180)=[0xffff, 0x3, 0x1f, 0x0, 0x2, 0x1, 0x1000, 0x9, 0x20, 0x5]}) 13:49:23 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) futex(&(0x7f0000000140)=0x2, 0x9, 0x1, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x1) dup3(r1, r0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x80) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x8008af26, &(0x7f0000000100)) 13:49:23 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$l2tp(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80a04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x800000020005491d, 0x800007f, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000080)={0x5, &(0x7f00000001c0)=[{0xffe1}, {0x1, 0x5, 0x0, 0xf5}, {0x0, 0x8, 0xff, 0x9d2c}, {0x0, 0x53, 0x47}, {0xfffb, 0x0, 0x80}]}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 13:49:23 executing program 1: [ 1198.192190][ T9395] new mount options do not match the existing superblock, will be ignored 13:49:23 executing program 1: 13:49:23 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1198.381879][ T9406] NFS: Device name not specified 13:49:23 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) r2 = dup3(r1, r0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000000)=0x8000000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000140)={{0xcb, 0x81}, 'port1\x00', 0xc3, 0x80002, 0x7, 0x400, 0xffff0000, 0x7ff, 0x4, 0x0, 0x0, 0x9}) 13:49:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x8000, 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) finit_module(r4, 0x0, 0x0) getsockname$tipc(r4, &(0x7f0000000500)=@name, &(0x7f0000000540)=0x10) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x350, 0xffffffff, 0xd0, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x13}, @multicast2, 0xffffff00, 0xffffff00, 'team_slave_1\x00', 'wg0\x00', {0xff}, {}, 0x2e, 0x1, 0x51}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x0, 0x1, 0x2, 0x3, 0x6, 0x4], 0x2}, {0x1, [0x6, 0x4, 0x2, 0x7, 0x2], 0x1, 0x2}}}}, {{@ip={@rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x1a}, 0xff, 0xffffffff, 'macvlan1\x00', 'ipvlan0\x00', {}, {}, 0x2, 0x0, 0x40}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}, {0x2, 0x3}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x170}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff, 0x1, 0x8}, {0x4, 0x1}}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0xd, "8f49"}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x9, 0x4, 0x3, 0x4, 0x0, 0x6], 0x5, 0x3}, {0x1, [0x6, 0x4, 0x5, 0x2, 0x4, 0x7], 0x3, 0x3}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) ioctl$SIOCX25GFACILITIES(r7, 0x89e2, &(0x7f0000000080)) [ 1198.545623][ T9406] NFS: Device name not specified 13:49:23 executing program 1: 13:49:23 executing program 3: [ 1198.609770][ T9412] new mount options do not match the existing superblock, will be ignored [ 1198.664744][ T9426] new mount options do not match the existing superblock, will be ignored 13:49:23 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000200)='projid_map\x00') write$cgroup_int(r1, &(0x7f0000000240)=0x8, 0x12) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:23 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:23 executing program 1: 13:49:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:23 executing program 3: 13:49:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x3}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:23 executing program 1: [ 1199.078007][ T9437] new mount options do not match the existing superblock, will be ignored 13:49:23 executing program 3: 13:49:23 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000000)={r5, @in6={{0xa, 0x4e23, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, &(0x7f0000000140)=0x84) 13:49:24 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {0x0, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:24 executing program 1: [ 1199.268049][ T27] kauditd_printk_skb: 66 callbacks suppressed [ 1199.268062][ T27] audit: type=1804 audit(1594734564.045:1146): pid=9451 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1328/bus" dev="sda1" ino=16336 res=1 [ 1199.320650][ T27] audit: type=1804 audit(1594734564.105:1147): pid=9453 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1711/bus" dev="sda1" ino=16377 res=1 13:49:24 executing program 3: [ 1199.382124][ T27] audit: type=1804 audit(1594734564.135:1148): pid=9455 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1328/bus" dev="sda1" ino=16336 res=1 13:49:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18, 0x0, 0x8, {0x7}}, 0x18) 13:49:24 executing program 1: 13:49:24 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0x9a0000, 0x100, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x990a79, 0x8, [], @ptr=0x8c2d}}) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xb0f}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0x116) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x503002, 0x20) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) [ 1199.556401][ T9460] new mount options do not match the existing superblock, will be ignored 13:49:24 executing program 3: [ 1199.657761][ T27] audit: type=1804 audit(1594734564.435:1149): pid=9467 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1329/bus" dev="sda1" ino=16372 res=1 13:49:24 executing program 1: 13:49:24 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:24 executing program 3: [ 1199.744076][ T9468] new mount options do not match the existing superblock, will be ignored [ 1199.804714][ T27] audit: type=1804 audit(1594734564.515:1150): pid=9468 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1434/bus" dev="sda1" ino=16327 res=1 13:49:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x4000000) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f00000003c0)={0x0, 0x0, [0x81, 0x6, 0x8a, 0x5, 0x9, 0xfffffffc, 0x9, 0x6]}) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x234, r3, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x14}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x240}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xa6a5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x110, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4996}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}]}]}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x349}]}]}]}, 0x234}}, 0x20000000) [ 1199.875352][ T9477] new mount options do not match the existing superblock, will be ignored [ 1199.976515][ T27] audit: type=1804 audit(1594734564.545:1151): pid=9467 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1329/bus" dev="sda1" ino=16372 res=1 [ 1200.047721][ T9482] new mount options do not match the existing superblock, will be ignored [ 1200.106841][ T27] audit: type=1804 audit(1594734564.645:1152): pid=9468 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir203543893/syzkaller.WGiKku/1434/bus" dev="sda1" ino=16327 res=1 [ 1200.159709][ T27] audit: type=1804 audit(1594734564.815:1153): pid=9486 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1330/bus" dev="sda1" ino=16331 res=1 [ 1200.197987][ T27] audit: type=1804 audit(1594734564.865:1154): pid=9486 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir192235553/syzkaller.OXjOBb/1330/bus" dev="sda1" ino=16331 res=1 13:49:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) r3 = dup3(r2, r1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f0000000000)=""/143, &(0x7f0000000140)=0x8f) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x42, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0xca, 0x0, 0x18, "e2b00d3ae5739dbbeec244e2d7674dc4", "38face80147992eecc6a9abb8c16dc54ba23b7526a5b80426c4bc88bb65f247c0ec8c510a8c05812ebe14e4b69986e795614d6224dc60ca1095da149c90bcb8987cc1f0958230f45cbe4d97842d91ae09948d1031f9e10e5ea1e06f038dd5187d60fb7d7d4d2962b70c32b77d7442ca7da7fff484645a1cf0d207ce7790da988ca6558b7d036f162b8697d8844ab3af52ea555ea47cccb3abefd3f22fcc7a8339fe90f6cd7bfd9f0d9579d164cbfa08dc7e0d1d8bc"}, 0xca, 0x3) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000001c0)={0xe64, 0x3, 0x1, 0x7fff, 0x4, 0xfffb}) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r6 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x1) dup3(r6, r5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) 13:49:25 executing program 1: 13:49:25 executing program 3: 13:49:25 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r2 = dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000200)={0x6, 0x0, 0x10001, 0x1}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) 13:49:25 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x100, {{0x2, 0x4e21, @rand_addr=0x64010102}}, 0x0, 0x1, [{{0x2, 0x4e22, @private=0xa010102}}]}, 0x110) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x400, 0x31) mq_timedsend(0xffffffffffffffff, &(0x7f0000000000)="6c7fc01a9aca774fa4547300dfc5048512b24c6480b2505ba6ba5b1b972742cd9d2addfe8b5a95cb9ba8e2ec8653c1441af5a0e3f89c567e4d663fccd8921d19fc", 0x41, 0x9, &(0x7f0000000080)) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) finit_module(r3, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000100)=0x1000000) 13:49:25 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) [ 1200.328308][ T27] audit: type=1804 audit(1594734565.025:1155): pid=9459 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir959885563/syzkaller.RCbOTA/1711/bus" dev="sda1" ino=16377 res=1 13:49:25 executing program 1: 13:49:25 executing program 3: 13:49:25 executing program 1: [ 1200.538448][ T9508] new mount options do not match the existing superblock, will be ignored 13:49:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x1) dup3(r2, r1, 0x0) finit_module(r2, 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x38, r4, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x40}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x5}, 0x80) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r4, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8800}, 0xd1) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x1c) [ 1200.679151][ T9501] new mount options do not match the existing superblock, will be ignored 13:49:25 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x364, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1c0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x4, 0x6, 0x8, 0x10000}, {}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x364}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:25 executing program 3: 13:49:25 executing program 1: 13:49:25 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = shmget$private(0x0, 0x4000, 0x800, &(0x7f000000e000/0x4000)=nil) r2 = shmget$private(0x0, 0x3000, 0x1218, &(0x7f0000007000/0x3000)=nil) shmat(r2, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000000)=""/157) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x8) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendto$phonet(0xffffffffffffffff, &(0x7f0000000180)="045010527baba02b670db560838a395a33182ed37e6762eee16b03985209b61eab1a908870a9c12a50b573289ae5631c26feb41b30276b76220e222b366a6782718edc7515a50338f7420f827b6bbc8ec26fd4b1964ae45a826f997eb4d6a8c5e5c1a3a323ca60da4013d01943601465f6a46b15d82b671791cfd349735519928ff91e34111053254c06cb0abb6c1392d9ca6dfdbb2f25fe536bcb89d384cfe2defa587c4d60f80695431855449b1adbfc4d5a7437cd", 0xb6, 0x20048000, &(0x7f0000000240)={0x23, 0x18, 0xe1, 0xf9}, 0x10) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[], 0x1) dup3(r4, r3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000140)={'veth0_to_bond\x00', 0x3}) shmat(r1, &(0x7f000000c000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r1, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x8008af26, &(0x7f0000000100)) 13:49:25 executing program 0: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in=@private}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000002c0)="30570775c862a668bce892f0c1229b8c4b62bc42ca2726d752e60e5fd7bfa8f7c5cb56f83eeed408", 0x28}], 0x1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = socket$inet(0x2, 0x8000b, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x5fffffff}, 0x2) 13:49:25 executing program 3: 13:49:25 executing program 1: [ 1200.974870][ T9524] new mount options do not match the existing superblock, will be ignored 13:49:25 executing program 4: r0 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400200, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2, {{0x200, 0x6, 0x1, r1}}}, 0x28) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000000)=r0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x4000000) [ 1201.122292][ T9529] new mount options do not match the existing superblock, will be ignored 13:49:25 executing program 3: 13:49:25 executing program 2: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x35c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xb04}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x3f, 0x3, 0x1, 0x3}, {0x4, 0x1f, 0x3, 0x80000001}, {0x401, 0x6, 0x0, 0x80000001}, {0x7, 0x1, 0x80, 0xfffffff7}, {0xef7, 0x0, 0x3f}, {0x23, 0x6, 0x1, 0x7}, {0x6, 0x3, 0xb2, 0xffffffff}, {0xfe, 0x5, 0x2, 0x3}, {0x0, 0x0, 0x40}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x0, 0x3, 0x1f, 0x3}, {0x0, 0x3f, 0x0, 0x2}, {0x0, 0x0, 0x81, 0x4}]}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1001c080}, 0x0) dup(0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.memory_spread_slab\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) 13:49:26 executing program 1: 13:49:26 executing program 5: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x24083, 0x4a) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3e35f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x40, 0x24, 0xf0d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x14, 0x2, [@TCA_FQ_QUANTUM={0x8, 0x3, 0xc5}, @TCA_FQ_FLOW_PLIMIT={0x8}]}}]}, 0x40}}, 0x0) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000180)) keyctl$chown(0x4, r5, r6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in=@rand_addr=0x64010100, @in=@multicast2, 0x4e20, 0x7, 0x4e23, 0x2, 0x2, 0xa0, 0xa0, 0x87, r3, r6}, {0x101, 0x2, 0x28, 0xffff, 0x201, 0x728b4bbc, 0x2, 0xffffffff}, {0xc202, 0x3c3c, 0x0, 0x1}, 0x80000000, 0x6e6bb4, 0x2, 0x1, 0x2, 0x1}, {{@in6=@empty, 0x4d5, 0xe832f0d13eaec485}, 0x2, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3507, 0x2, 0x855771a6e9933948, 0x1, 0x50, 0x40, 0xb}}, 0xe8) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000200)=0x5) 13:49:26 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x1) dup3(r1, r0, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[], 0x1) dup3(r3, r2, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0x1) dup3(r5, r4, 0x0) finit_module(r5, 0x0, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[], 0x1) dup3(r7, r6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@private0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r8, 0x4008af00, &(0x7f0000000100)=0x4000000) 13:49:26 executing program 1: [ 1201.350286][ T9545] ------------[ cut here ]------------ [ 1201.376060][ T9545] WARNING: CPU: 0 PID: 9545 at fs/read_write.c:427 __kernel_read+0x41d/0x4d0 13:49:26 executing program 3: [ 1201.413074][ T9542] new mount options do not match the existing superblock, will be ignored [ 1201.444876][ T9545] Kernel panic - not syncing: panic_on_warn set ... [ 1201.451494][ T9545] CPU: 0 PID: 9545 Comm: syz-executor.5 Not tainted 5.8.0-rc5-syzkaller #0 [ 1201.460075][ T9545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.470126][ T9545] Call Trace: [ 1201.473421][ T9545] dump_stack+0x18f/0x20d [ 1201.477768][ T9545] panic+0x2e3/0x75c [ 1201.481680][ T9545] ? __warn_printk+0xf3/0xf3 [ 1201.486277][ T9545] ? printk+0xba/0xed [ 1201.490263][ T9545] ? log_store.cold+0x16/0x16 [ 1201.494947][ T9545] ? __warn.cold+0x5/0x45 [ 1201.499282][ T9545] ? __kernel_read+0x41d/0x4d0 [ 1201.504138][ T9545] __warn.cold+0x20/0x45 [ 1201.508401][ T9545] ? __kernel_read+0x41d/0x4d0 [ 1201.513173][ T9545] report_bug+0x1bd/0x210 [ 1201.517511][ T9545] handle_bug+0x38/0x90 [ 1201.521676][ T9545] exc_invalid_op+0x13/0x40 [ 1201.526182][ T9545] asm_exc_invalid_op+0x12/0x20 [ 1201.531037][ T9545] RIP: 0010:__kernel_read+0x41d/0x4d0 [ 1201.536412][ T9545] Code: fd ff ff e8 65 12 b6 ff 45 31 c9 45 31 c0 b9 01 00 00 00 4c 89 f2 89 ee 4c 89 ef e8 5d 22 12 00 e9 46 ff ff ff e8 43 12 b6 ff <0f> 0b 49 c7 c4 ea ff ff ff e9 11 fe ff ff 4c 89 f7 e8 2d 76 f5 ff [ 1201.556014][ T9545] RSP: 0018:ffffc90004b27c40 EFLAGS: 00010216 [ 1201.562083][ T9545] RAX: 0000000000000361 RBX: ffff8880a37cacc0 RCX: ffffc90013ec5000 [ 1201.570056][ T9545] RDX: 0000000000040000 RSI: ffffffff81bda7bd RDI: 0000000000000005 [ 1201.578027][ T9545] RBP: ffffc90004ad1000 R08: 0000000000000000 R09: 0000000000000000 [ 1201.586001][ T9545] R10: 0000000000000000 R11: 0000000000000000 R12: 000000000808801c [ 1201.593976][ T9545] R13: ffffc90004b27d00 R14: ffff8880a37cad44 R15: 0000000000000001 [ 1201.601968][ T9545] ? __kernel_read+0x41d/0x4d0 [ 1201.606759][ T9545] kernel_read+0x52/0x70 [ 1201.611014][ T9545] kernel_read_file+0x2e5/0x620 [ 1201.615878][ T9545] ? free_bprm+0x230/0x230 [ 1201.620303][ T9545] kernel_read_file_from_fd+0x56/0xa0 [ 1201.625684][ T9545] __do_sys_finit_module+0xe6/0x190 [ 1201.630903][ T9545] ? __do_sys_init_module+0x1f0/0x1f0 [ 1201.636274][ T9545] ? __might_fault+0x190/0x1d0 [ 1201.641074][ T9545] ? _copy_to_user+0x126/0x160 [ 1201.645862][ T9545] ? __x64_sys_clock_gettime+0x165/0x240 [ 1201.651497][ T9545] ? lock_is_held_type+0xb0/0xe0 [ 1201.656438][ T9545] ? do_syscall_64+0x1c/0xe0 [ 1201.661029][ T9545] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1201.667013][ T9545] do_syscall_64+0x60/0xe0 [ 1201.671435][ T9545] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1201.677330][ T9545] RIP: 0033:0x45cba9 [ 1201.681219][ T9545] Code: Bad RIP value. [ 1201.685282][ T9545] RSP: 002b:00007fd726ad1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 1201.693695][ T9545] RAX: ffffffffffffffda RBX: 00000000004dd1c0 RCX: 000000000045cba9 [ 1201.701666][ T9545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1201.709641][ T9545] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1201.717612][ T9545] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1201.725585][ T9545] R13: 00000000000000d3 R14: 00000000004c399e R15: 00007fd726ad26d4 [ 1201.735124][ T9545] Kernel Offset: disabled [ 1201.739449][ T9545] Rebooting in 86400 seconds..