0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:39 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 10:32:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000006, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000000000/0x3000)=nil) 10:32:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}}) 10:32:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1003.468224][T31727] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1003.554389][T31727] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:39 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 1003.634793][T31727] Error parsing options; rc = [-22] 10:32:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}}) [ 1003.872693][T31761] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1003.914802][T31761] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1003.951153][T31761] Error parsing options; rc = [-22] 10:32:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) getrusage(0xffffffffffffffff, &(0x7f00000003c0)) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x4615acc941fca3fb) shutdown(r1, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xda180, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000380)=0xe8) r4 = getegid() mount$fuse(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x1000, &(0x7f0000000500)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@pcr={'pcr', 0x3d, 0x3d}}]}}) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000140)=[0x0, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) chown(&(0x7f0000000000)='./file0\x00', r5, r6) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000180)=0x20000005, 0xfff6) 10:32:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}) 10:32:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:40 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x80080) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x8, 0x1, 0x7, 0x540, 'syz0\x00', 0x2}, 0x2, 0x30, 0x3f, r1, 0x1, 0x7fff, 'syz1\x00', &(0x7f0000000100)=['vboxnet0security:^:\x00'], 0x14, [], [0x8, 0x4, 0x4, 0x9]}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'erspan0\x00', 0x400}) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x7, 0x0, 0x1, 0x7fffffff, 0x400, 0xffffffffffffffff, 0xa, 0x4}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000000d000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mremap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f000000a000/0x1000)=nil) 10:32:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}}) 10:32:42 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) 10:32:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={&(0x7f0000139ff0)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f000093eee8)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000500"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x80000) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000001c0)="ecf7b310ded474c26d3a2e6b614bc0c4cfeaa4462e87c4ae9056a82c6393dba817cc99aef88f932e445c5f1c6830a10e42836bd4aba7fd4f0b6e9363aab683ab55adcf28b04741bae619907a02d0d6b92ef25eb48ff58ef101250e36299574d0d4a41684c1ecf456d64d0c4c597d1036fa5e3ef5badc41000e66e424e1e6419c8813a06b3093c89bca06904ca5812707f0543554b8f4ad7c8a80f0bf20ed2848fed7eb6be429af53f2c433fddbac32decf8ec95cbc0ea36cf3c65af6d0a359e95a3d10a8eddff7") getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x100000001}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000300)={r3, 0x6, 0x30, 0xfffffffffffffff9, 0xe00000000}, &(0x7f0000000340)=0x18) 10:32:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/8) recvfrom(r0, &(0x7f0000000100)=""/133, 0x85, 0x40, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}}) 10:32:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff00000000}}) [ 1006.949517][T31825] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400040, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0xeb3d) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/243, &(0x7f0000000200)=0xf3) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:42 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fstat(r0, &(0x7f0000000000)) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x80000) [ 1007.059698][T31825] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1007.158394][T31825] Error parsing options; rc = [-22] 10:32:43 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) 10:32:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\xff`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}}) [ 1007.257435][ T26] audit: type=1804 audit(1560853963.128:90): pid=31851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir089184717/syzkaller.EHOrlp/1024/bus" dev="sda1" ino=16542 res=1 10:32:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x88}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x24, r1, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x19d}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40001) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000002c0)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1fffff) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000000)) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x100000000) connect$rose(r2, &(0x7f0000000280)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000240)) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x8, 0x20, 0x3ff, 0x3, 0x0, 0xff, 0x198, 0x1, 0x5, 0x5, 0x7, 0xe9, 0x401, 0x6, 0x7, 0xfffffffffffffeff, 0x7ff, 0x7026, 0xc35f, 0x9, 0x5, 0xffffffff, 0x7, 0x5, 0x4, 0x6, 0x100, 0x0, 0x5, 0x5, 0x8, 0xbc, 0xff, 0x100000001, 0x8, 0x875, 0x0, 0x7, 0x5, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x100, 0x8000, 0x200, 0x7, 0x401, 0x100000001, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x1) [ 1007.354734][ T26] audit: type=1804 audit(1560853963.188:91): pid=31851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir089184717/syzkaller.EHOrlp/1024/bus" dev="sda1" ino=16542 res=1 10:32:43 executing program 2: socket$inet6(0xa, 0x4000000080002, 0x0) 10:32:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}) [ 1007.517646][T31864] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='^${md5sum.\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x6c, 0x15}, 0x0, &(0x7f0000000180)="0cdf6bd84721da982ce19b43ccb5db61d2d03d6f7b28ba98604ef46aedc9a59ff2faba90f5d02c6ad678007fa46fc6808895c166a126f7c63cf2065f052cf3bedda94bc484da87c9beb5bfd482b5c13ff492b8a2296a94b77fe79b45d71a80d034451935b44f199f4a70dbc0", &(0x7f0000000200)=""/21) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1007.631772][T31864] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8000, 0xc0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f000000d000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000300)=""/110, 0x6e, 0x12002, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x5, 0x5}, &(0x7f00000002c0)=0x90) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x4, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000000000/0x3000)=nil) 10:32:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1007.739059][T31864] Error parsing options; rc = [-22] 10:32:43 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) 10:32:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}}) 10:32:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept(r0, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000000)=0x80) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000680)='SEG6\x00') ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000500000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4082, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000640)={0x0, 0x1, 0x2007, 0x1}) shmctl$SHM_UNLOCK(r1, 0xc) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='}GPLem0#vmnet0.ppp1^ppp1wlan0nodev,vmnet0security\x00', &(0x7f0000000240)='[)\x00', &(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='usereth0{vmnet0proc{\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='selflo\x00', &(0x7f00000003c0)='ext4\x00'], &(0x7f00000005c0)=[&(0x7f0000000480)='\\[bdevGPL\x00', &(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='ext4\x00', &(0x7f0000000580)='md5sum\x00'], 0x1000) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x100) [ 1008.045735][T32002] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1008.143275][T32002] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:44 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1008.189488][T32002] Error parsing options; rc = [-22] 10:32:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4041, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000000c0)={0xfffffffffffffffb, 0x100000000, 0x5, 'queue0\x00', 0x8}) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x430000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x5, 0xfffffffffffffffb, 0x1, 0xfffffffffffffff8, 0x0, 0x4, 0x47f4a889910b3f3a, 0x8, 0x5, 0xfffffffffffffff9, 0x0, 0x3ff, 0xfffffffffffffff7, 0x22de, 0x6, 0x1, 0x2, 0xffffffff00000000, 0x8, 0xffffffffffffff7f, 0x2, 0x81, 0x80000001, 0x7, 0x8, 0x9, 0x7, 0x7ff, 0x80b, 0x5, 0xc, 0x7, 0x4, 0x4, 0x7, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0xb8e, 0x3, 0xd, 0x0, 0x1, 0x1000}, r1, 0x8, 0xffffffffffffff9c, 0x9) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) 10:32:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}) [ 1008.325141][T32023] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1008.419862][T32023] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:44 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1008.484684][T32023] Error parsing options; rc = [-22] 10:32:44 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000440)={0x0, @local, @multicast2}, &(0x7f0000000400)=0x483) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, r2}, 0xc) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x208002, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x120}, 0x8) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) 10:32:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 10:32:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1008.676135][T32049] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1008.748263][T32049] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1008.846980][T32049] Error parsing options; rc = [-22] 10:32:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x1a, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9e8}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xa}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4041}, 0x40000) mmap$perf(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x88910, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000b000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x8, 0x0, 0x20000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) socket$caif_seqpacket(0x25, 0x5, 0x3) getdents64(r0, &(0x7f00000000c0)=""/5, 0x5) 10:32:44 executing program 2: r0 = socket$inet(0x2, 0x803, 0x85) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000100)="c2", 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000003c0)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x4, 0x7, 0x81, 0x0, 0xf}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 10:32:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:47 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f00000000c0), 0x80000) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000100), 0x4) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) mmap$xdp(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x44011, r1, 0x80000000) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x101, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0xc2604110, &(0x7f00000000c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40, 0x10) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x42000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x100032, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="95f9c94ee881e361e10f621d0b4f6b0c", 0x10) 10:32:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) 10:32:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x01\xa0\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) 10:32:47 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101280, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1011.760159][T32108] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1011.820644][T32108] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1011.919885][T32108] Error parsing options; rc = [-22] 10:32:47 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xe0P\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0xc2604110, &(0x7f00000000c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40, 0x10) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x42000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x100032, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="95f9c94ee881e361e10f621d0b4f6b0c", 0x10) 10:32:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) 10:32:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x7}, 0x28, 0x1) shmget$private(0x0, 0x4000, 0x8, &(0x7f0000008000/0x4000)=nil) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000000000/0x3000)=nil) 10:32:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00q`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1012.211840][T32135] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1012.322700][T32135] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:48 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1012.378382][T32135] Error parsing options; rc = [-22] 10:32:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x105000, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{r1, r2/1000+10000}, {0x0, 0x2710}}, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 10:32:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xd0p\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1012.517372][T32161] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1012.566496][T32161] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1012.693473][T32161] Error parsing options; rc = [-22] 10:32:48 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x401) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000180)={0x1, 0x0, {0x7382, 0x6, 0x2023, 0x4, 0x2, 0x5, 0x1, 0x6}}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f0000000000)=[@increfs], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x29, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0c63000009631040000000000000000000000000000000000463044001000000066304400000000005"], 0x0, 0x0, 0x0}) 10:32:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000000a000/0x3000)=nil) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x89) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0)=0x800, 0x4) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000000c0)={0x5, 0x4, [0xabd, 0x6cf7, 0x67a, 0x3, 0x9], 0x400}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x100) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000280)={0x7, 0x2, 0x1, 0x0, 0x12}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000140)={&(0x7f0000005000/0x3000)=nil, 0x5, 0x5, 0x20000083, &(0x7f0000005000/0x1000)=nil, 0x9}) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000000)) 10:32:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) 10:32:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00`q\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1012.837761][T32180] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1012.916820][T32180] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1012.989971][T32180] Error parsing options; rc = [-22] 10:32:48 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:49 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000003000/0x4000)=nil) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x4010, r0, 0x8000000) [ 1013.141207][T32201] binder: 32193:32201 unknown command 5 [ 1013.168979][T32200] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1013.178445][T32201] binder: 32193:32201 ioctl c0306201 200000c0 returned -22 10:32:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}) 10:32:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1013.242379][T32200] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:49 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1013.354350][T32200] Error parsing options; rc = [-22] 10:32:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x20000000000002fd, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x50}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:32:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}) [ 1013.545316][T32225] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00p\xd0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1013.596427][T32225] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000000, 0x100}) r1 = syz_open_pts(r0, 0x8000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000011c0)=0x16) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100000001, 0x89cd418bd4c381d8) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000001180)={0x1, 0xd09f, 0xfff}, 0xc) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000080)={0x1000, &(0x7f0000000180)=""/4096}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7d}) 10:32:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x12000, 0x3, &(0x7f0000009000/0x12000)=nil) r1 = dup2(r0, r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x2a, 0x3, 0x0, {0x6, 0x9, 0x0, '.}selinux'}}, 0x2a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1013.770016][T32225] Error parsing options; rc = [-22] 10:32:49 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}) 10:32:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00P\xe0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:49 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={r1, @rand_addr=0x8001, @broadcast}, 0xc) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x40080) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000100)={0x5, 0x1f, 0x8000, 0x8, 0x9ed9, 0x1b, 0x24, "b0855ba1f550e1d315471e8672a2cea4949e0579", "2e6d5756b3918d733dd4c6e19c8acb960b964c5f"}) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f00000000c0)={&(0x7f000000a000/0x4000)=nil, 0x4000}) 10:32:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:50 executing program 2: memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000400)='./file0\x00', 0x400000, 0x20) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000002c0)={0x0, 0xfffffffffffffd61, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{0x1, 0x0, 0xffffff8d}, 0xf00, 0x400b, 0x448e370e0511d35e}}, 0x2fe40}, 0xa}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x1d, r3}, 0x10, &(0x7f0000000240)={&(0x7f0000000140)={0x4, 0x4, 0x100000000, {r4, r5/1000+30000}, {0x0, 0x2710}, {0x3, 0x2, 0x1, 0x401}, 0x1, @can={{0x2, 0x8, 0x3, 0x1}, 0x4, 0x0, 0x0, 0x0, "cc319a70d940a6c6"}}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x1) 10:32:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}}) 10:32:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:50 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}) 10:32:50 executing program 2: r0 = socket$inet6(0xa, 0x100000000003, 0x3a) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000080)='net/ip_tables_targets\x00') connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={';:\x04', './file0'}, 0xfdef) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 10:32:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:50 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x2, 0x1, 0x4, 0x1f, r1}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}}) [ 1014.901747][T32421] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1014.982121][T32421] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000540), &(0x7f0000000580)=0x4) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f000000d000/0x4000)=nil) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000006e21244f6509c78600"/24]) clock_getres(0x5, &(0x7f00000005c0)) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000500)=0x3) lookup_dcookie(0x7, &(0x7f0000000400)=""/208, 0xd0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) 10:32:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}}) [ 1015.038816][T32421] Error parsing options; rc = [-22] 10:32:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000100)={0x3, 0x3, 0x0, 0x0, 0x5}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000040)=0x10) 10:32:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:51 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000000c0)=0x5) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}) [ 1015.405212][T32464] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1015.437292][T32464] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:51 executing program 2: r0 = getpgid(0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r1, 0x0) capset(&(0x7f0000003180)={0x19980330, r0}, 0x0) [ 1015.457481][T32464] Error parsing options; rc = [-22] 10:32:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x7}, 0x8) 10:32:51 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}) 10:32:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x76, 0x0, &(0x7f0000000040)) r1 = fcntl$dupfd(r0, 0x0, r0) bind$netrom(r1, &(0x7f0000000180)={{0x3, @bcast}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 10:32:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x2000004, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000000c0)={0xe, 0x9, {0x0, 0x6, 0x0, {0x80000000, 0x3}, {0xf80, 0x8001}, @const={0x6b35e779, {0x1, 0x8, 0x3ff, 0x2}}}, {0x57, 0x10001, 0x2, {0x20, 0xfffffffffffffffd}, {0x8000, 0x1000}, @rumble={0x9, 0xffffffff}}}) [ 1015.820506][T32494] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1015.945940][T32494] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="91dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4) r2 = socket$inet6(0xa, 0x6, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x10000, 0x2002) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f0000000080)=@null) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 1016.058314][T32494] Error parsing options; rc = [-22] 10:32:51 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}) 10:32:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0x3, 0x3, 0x9, 0xf9ab6057bdc2bd51}, 0x8000}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x4e21, @broadcast}, {0x6, @broadcast}, 0x40, {0x2, 0x4e22, @empty}, 'hwsim0\x00'}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1016.333494][T32530] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1016.369016][T32530] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:52 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x10000040001, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1020, 0x0) 10:32:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1016.408470][T32530] Error parsing options; rc = [-22] 10:32:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}) 10:32:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:52 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1000000, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x462, &(0x7f0000000100)=0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000000240)=[{}], 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1016.694133][T32560] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1016.722669][T32560] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}) [ 1016.751722][T32560] Error parsing options; rc = [-22] 10:32:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, 0x0) tkill(r0, 0x1000000000013) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:52 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}) 10:32:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1017.039951][T32580] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:52 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x100, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000040)=0x3f, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'lo\x00\x00\xcc\x00 \x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'lo\x00'}) 10:32:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1017.120649][T32580] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1017.239354][T32579] cgroup: fork rejected by pids controller in /syz3 [ 1017.258612][T32580] Error parsing options; rc = [-22] 10:32:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}) 10:32:53 executing program 3: unshare(0x40600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:53 executing program 3: unshare(0x40600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:53 executing program 3: unshare(0x40600) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:53 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}}) 10:32:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:53 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x541040) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0xf, {0x3, 0x3, 0x7f, 0x1}}) r2 = getpgid(0xffffffffffffffff) r3 = getpgid(0xffffffffffffffff) tgkill(r2, r3, 0x3b) 10:32:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:53 executing program 1: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1820000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0xa00, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x7, 0x7fffffff, @udp='udp:syz1\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x200480d4}, 0x40000) [ 1018.019243][T32732] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1018.068425][T32732] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}}) [ 1018.112661][T32732] Error parsing options; rc = [-22] 10:32:54 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40000, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x1, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x1) acct(&(0x7f0000000140)='./file0\x00') ioctl$KDMKTONE(r2, 0x4b30, 0xe3) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000180)) write$P9_RVERSION(r2, &(0x7f0000000240)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) write$P9_RVERSION(r2, &(0x7f0000000280)={0x13, 0x65, 0xffff, 0x5, 0x6, '9P2000'}, 0x13) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f00000002c0)={&(0x7f0000ff9000/0x4000)=nil, 0x5dc, 0x3, 0x80, &(0x7f0000ffc000/0x2000)=nil, 0x5}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x880, 0x0) rt_sigprocmask(0x0, &(0x7f0000000340)={0x8}, &(0x7f0000000380), 0x8) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000003c0)={@rand_addr=0x2, @multicast1, @dev={0xac, 0x14, 0x14, 0x26}}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000480)={0x4, 0x8, 0xfa00, {r4, 0x100}}, 0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x2) r5 = dup3(r0, r0, 0x80000) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) ioctl$KVM_GET_IRQCHIP(r5, 0xc208ae62, &(0x7f0000000600)={0x0, 0x0, @ioapic}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000800)={@dev, @broadcast, 0x0}, &(0x7f0000000840)=0xc) sendto$packet(r5, &(0x7f0000000700)="89e36d264a346a6fb94721ef681c2ff5ca02e52970a8b6180c41bf5ea19f75bc7398ea1a028e876800748c724c399db61015ff108fd316037d6cae5920462bc06eb5cdc00b7d3834636d5ec62fd0a11efed55f3d7c1f87ed939c9494144e639465179b327d2f78079fc3af5e86a79b5619968a1dec383a93ea0d165e694f1e4f16d93a30e9e18310fba75e602c8118cf2fb09bf31b3fd13d27305fedb1c15a0ffdeb7aa09bd09504acf8b4e4dd8725e14eb8a82c5a0f95875269e0593f28c41bba00204322b81b2108904762a32538a8c7671d0de32e35b1c1c3829ac129913ce6340c4665a0057fab75305756ca4a7277e8182abd", 0xf5, 0x44000, &(0x7f0000000880)={0x11, 0xf5, r6, 0x1, 0x5, 0x6, @local}, 0x14) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f0000000900)={r7, r8+10000000}, &(0x7f0000000940)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000980)={0xfffffffffffffffa, 0x100000001, 0x77b9208b}) io_setup(0x800, &(0x7f0000000a00)=0x0) io_cancel(r9, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x1, r1, &(0x7f0000000a40)="cc5c29e752b676cab2c0d1ca2a27b252c8536f049c261b55d80b41dcdb447f205665661d0507d7d9668a9db4982518d0ee", 0x31, 0x2, 0x0, 0x0, r3}, &(0x7f0000000ac0)) fsconfig$FSCONFIG_SET_PATH_EMPTY(r5, 0x4, &(0x7f0000000b00)='/dev/dlm-monitor\x00', &(0x7f0000000b40)='./file0\x00', r3) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000bc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14, r10, 0x900, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 10:32:54 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1b070, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x4, 0x2000) ioctl$KDDISABIO(r1, 0x4b37) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)) [ 1018.349299][T32764] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1018.418934][T32764] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}}) 10:32:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1018.519114][T32764] Error parsing options; rc = [-22] 10:32:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}) 10:32:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x6, &(0x7f0000000000/0x3000)=nil) fspick(r0, &(0x7f0000000100)='./file0\x00', 0x1) 10:32:54 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x01\xa0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1018.772947][ T426] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1018.880924][ T426] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff1000/0xf000)=nil, 0xf000, 0x3, 0x1b07b, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1018.960678][ T426] Error parsing options; rc = [-22] 10:32:55 executing program 2: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) unshare(0x400) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fffffff, 0x404080) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r3) write$evdev(r0, &(0x7f00000000c0)=[{{}, 0x15, 0x4c0f, 0x464b}, {{}, 0x7, 0x6, 0xfff}, {{0x77359400}, 0x1, 0xffffffff00000001, 0x3}, {{0x77359400}, 0x15, 0x4, 0x800}, {{}, 0x11, 0x0, 0x7ab}, {{r1, r2/1000+10000}, 0x17, 0x2, 0x3}], 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 10:32:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}}) 10:32:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) write$P9_RWALK(r0, &(0x7f00000001c0)={0x4a, 0x6f, 0x2, {0x5, [{0xc, 0x1, 0x4}, {0x2, 0x3, 0x8}, {0x40, 0x0, 0x7}, {0x4, 0x2, 0x2}, {0x10, 0x1, 0x6}]}}, 0x4a) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x1, 0x0) accept$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:55 executing program 3: unshare(0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00`\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1019.482062][ T559] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xf0\x89\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}}) [ 1019.554778][ T559] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000180)={0x0, 0x1, [0x0, 0x6, 0x9, 0xbf3f, 0xfffffffffffffffb, 0x5, 0x5, 0x4]}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x281, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000000c0)) [ 1019.673800][ T559] Error parsing options; rc = [-22] 10:32:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\xff\xff\xff\xff\xa0\x01', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x89\xf0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:55 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xa8c, 0x80000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x390, 0x118, 0x0, 0x118, 0x238, 0x118, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x4, &(0x7f00000000c0), {[{{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff, 0x0, 'bond0\x00', 'veth1_to_bridge\x00', {}, {0xff}, 0x11, 0x2, 0x5}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@unspec=@state={0x28, 'state\x00'}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x208, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x9}}}, {{@ip={@remote, @empty, 0xff, 0xffffffff, 'teql0\x00', 'tunl0\x00', {0xff}, {0xff}, 0x2e, 0x2, 0x4}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x47e, 0x101}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x19}, [0xffffffff, 0xff000000, 0xff, 0xff000000], 0x4e20, 0x4e21, 0x4e23, 0x4e22, 0x7, 0x6, 0x3, 0x396, 0xffffffffffffaefd}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xf}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 10:32:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}}) 10:32:55 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x8, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x4000)=nil, 0x4000, 0xc, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x7ff}, &(0x7f0000000240)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:55 executing program 3: unshare(0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1020.180683][ T712] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}) 10:32:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x90\x1cWUU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1020.232318][ T712] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:32:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f000000a000/0x4000)=nil, 0x4000) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x1, [0x0]}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1020.277259][ T712] Error parsing options; rc = [-22] 10:32:56 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000100)=""/139) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000000500)=@allocspi={0x100, 0x16, 0x501, 0x0, 0x0, {{{@in6=@remote, @in=@remote}, {@in6=@remote}, @in=@dev}}, [@ipv4_hthresh={0x8}]}, 0x100}}, 0x0) 10:32:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}) 10:32:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xb0\x1eWUU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:56 executing program 3: unshare(0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0xa8) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x9, 0xfff, 0x1, 0x5}, 0x10) ioctl$KVM_NMI(r0, 0xae9a) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000500)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x34, 0xffffffffffffffff) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000100)) 10:32:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\xff\xff\xff\xff\xff`', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1020.696981][ T851] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:32:56 executing program 2: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a28093020a430000a843090a26274d040016001500154002004c000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x10) 10:32:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}) [ 1020.767414][ T851] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1020.814375][ T851] Error parsing options; rc = [-22] 10:32:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000100)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x4000000000000007) 10:32:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1020.927747][ T904] netlink: 'syz-executor.2': attribute type 21 has an invalid length. 10:32:56 executing program 3: unshare(0x40600) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1020.970471][ T904] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00v', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f0000000180), 0x12) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8100000, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000380)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000000)={0x800, 0xb3, 0x9ca5}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x3, 0x3, 0xc8, 0xffff, 0x4}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={r4, @in={{0x2, 0x4e22, @multicast1}}, [0x8, 0x100000000, 0x2, 0x6, 0x0, 0xfff, 0x16, 0x4, 0x9572, 0x2, 0x7, 0xa2e, 0x0, 0x0, 0xc6a0628]}, &(0x7f0000000340)=0x100) accept4(r0, 0x0, &(0x7f00000003c0), 0x800) 10:32:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}) 10:32:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\xff\xef\xff\xff\xff\x7f', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:57 executing program 3: unshare(0x40600) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) flock(r0, 0x8) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2, 0x0, 0x40000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}) 10:32:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x96', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:57 executing program 3: unshare(0x40600) mknod$loop(0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:57 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x3, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:57 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r2, @ANYBLOB="04012a9d7000fcdbdf2503000000080006000100000018000400000000000104000004000000dc0c0000430a000008000500000000040800030005000000080002000002000008000300060000005f8a23701959aea50000000000000000000000bb100004000000010007000000010001001400040007000000090000000600000000000038583933739065544c51854f80ffb919e15da251ce695c0ca3b8718624315298df90085de3533b3385996e448aa5bb25b7d0ce67645b1d811355cea84c82eee6a50b5581ec6cb89bb8a7"], 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000854) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x3) listen(r0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$rose(r3, 0x104, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:32:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}) 10:32:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00q', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:57 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00UUW\x1c', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x400, 0x1) ioctl$TCSBRK(r0, 0x5409, 0x6) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}) 10:32:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0xc49, 0x1, &(0x7f0000000480)=[{&(0x7f0000000440), 0x0, 0x800000000007}], 0x10002, 0x0) 10:32:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00UUW\x1e', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:58 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:58 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000001a40)={0x0, 0x70, 0x3, 0x3, 0xffff, 0x80000000, 0x0, 0x44, 0x1, 0x8, 0x6, 0x100000001, 0x5, 0x1, 0x2, 0x5, 0x9, 0x1, 0x6, 0xfffffffffffffff7, 0x80, 0x9, 0x0, 0x7f, 0x7ff, 0x2, 0x1000, 0x6, 0x81, 0x3, 0x6, 0x3ff, 0xfffffffffffff800, 0xffffffffffffffc1, 0x0, 0x1, 0x41af, 0xffffffff, 0x0, 0xfffffffffffff801, 0x2, @perf_config_ext={0x10001, 0xffffffffffffff00}, 0x1, 0xc27, 0x5, 0x2, 0xfffffffffffffffc, 0x6, 0x6}, 0xffffffffffffffff, 0xe, r0, 0x1) r4 = getpid() sendmsg$nl_generic(r0, &(0x7f0000001a00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000019c0)={&(0x7f0000000300)={0x16ac, 0x3e, 0x200, 0x70bd26, 0x25dfdbfe, {0x4}, [@nested={0x31c, 0x17, [@typed={0x8, 0x67, @u32=0x2dd9}, @generic="18323de873053354699dd46fdeada77ee2df0bdec5c80d2a7b5da5425e3289cf4bccdc2747e53e896b3ad342583a057de530202dcad6feb7c400dd508734416fe757cbf3ff937c13f118b18a99b41976ed8518a3e71811fc7dfb581f0df4959fca24c5ba67f85f049ab756aeca06b5b482d948369d90401a48c76218b5c482caa903e055da48f86c14cc19c3823b808a9b621bf0cbd10e24b1f4199d", @generic="d445f0964484a21f3d78e6bd05a095c038fcdd9f154966816edacbb69abf5432a000a540c0e0ec9d1e884d188b6d85aca651dd17f377e7381ae9974065ca76bf470e15babf0c8ad6b3cb83ea2da36a3bb844b1146dc4cf6dbbe97ea229ebbbf607e4d3d5b1612a048873bffe14b242acc057f726ce1af4b866a8b6ab4bfc0331b56a768a86090980", @generic="571ec7d786c18c18d3ed8114c0da39d739dd6fe8bd3233aa98724a2e49c03d6f0844e52113031677d5e5aa01bfbbd44107036f3877e0e6555a163319dcb967815c4ffc943efc256aac4600", @generic="bc8e9be7f27f6d77f9657d9fca7666520e4235eaecc919589b4f42d1fe1a5a64e9bc61a1b65f1ade3705b96b4a0f696abd759183af5cf1ce324ed087296d0ebeffca8f480e7602e7b8595f5294a92d845e8837b55b53f3b319a7acf3e4e14da2f047c60f9c793e4b8ac89bebdf61dc9bfcc0e139a4b8dfe7b1f945010b3e04ab5b656772cd62ae7458ccf1c3a216b3761062f69dcf5e2f3511567f73af785dfb6e68b73c996cdaa3a8df7b208fd50427631c43e83309c3fedd17b7acd1d812401099bb85ea49198a27a53bc8ceed505c4d5278b67e137a72bd8ed9b3620981dddfb270d0ba4ebd2c35536049ebde562958a8b1e6b1", @generic="c0f2331fdf404358160cc3ba81856489c90192f32b3e5b57308fd1f422f8fc53a71a934876c82d2a53ec92bc1e2e3901b0674342647b2d4c7d9a46fb55cfd6076350a8a1845b0be66516949e7744fbbcf3f708387f8871a97656", @generic="c42a85c10190fde3d5c3754bc1a0ec7add1d9db6fafc863bdd4e626f0a0b494b1d03daada5b866bded858d90165e98452d8d24d7473ecaa42a7c7d92186b07088e9baa51f8e23b2a23848e42c6fdb5"]}, @generic="2fdb52175f5f4d97e64886f325c145122b81bfd3f207c7f0eebfa3820e5ff350d11498d7c437a78cdec3fac75ff025025d3b3b1300973ca939daef7b6372751b5e4693403ade6792f59cdec62312670e15245c227a3da345ffe003f4adeae3cc21d14a793d295f840aa46d2b8b920746f0a29cef1308ec18942e696c41dce02a2ffd408ddd76c0896b995b3078dd32315078864cee442336028d859eb534cdb0bc5cbd66dcbb61157267c1659033b6412026a03e090b6b7e2d38113d6bd9bc3b24eb3fa15a734928d2b781ab8db69436b9edf9ccfba19641371ed1acc1a865fb3bdf6710037527574303219a0df437fcbf72a8cf6737b2e97b4722617a7d0b", @typed={0x8, 0x60, @uid=r1}, @generic="9cf31cabb254e363edafa0dd26c63eda01cb599ae3023b52e7442a6c94c19e9a5a292dffb5164bb2b99cd18c4bc1a1ab2cb5c506f0b33c62005d541a5f8fed0bb6f49f7cb25042cba81c23ec27b6ade1a93888f64a153b9f94a35ff315d4ab916e96de64bd01584865e7a620eb555653e8bed6f3efe7f89d681d0a2bebc69b5e66a4d8cf37cc9b4c8eab3e6b50cceb2870", @nested={0x2c, 0x89, [@generic="973f0b22b8946a4767c2afbd09055f64d50fe33e7e87", @typed={0x8, 0x37, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}, @typed={0x8, 0xb, @pid=r2}]}, @generic="bc5997c01252f0f3f0b77be14e", @nested={0x11a8, 0x50, [@generic="375594ae2e4ca7ccf3a3b766f73626836c13d30e80d8900f5f923957e1aca2da3e41ab83689fd971f4030d3823545463b14909233e0d7eb8e500af3274225d49ec520b6829d99ad9f5809a877e4dc0d0867ecd25653d4b22aa875079dca5a1188c76c792837a40308a4c9e324c1a077ff6420f4c2ef1a219638f6abfe33bd609cda9a9defcf9aa922255620a936170b5", @typed={0x8, 0x75, @pid=r3}, @generic="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", @generic="3f7b3146bc4ccffaee7c3d3e928271345bca6f083161fb4439ee61e50ab4094c11e379e9382cdf5a9a963bfd66d9b0457b77a554a615b15071f4ba5e06e8d5994ab3c579c77ecaa625dcdc411e1ebbe71da0377292575ad4", @typed={0x8, 0xc, @pid=r4}, @typed={0xc, 0x2f, @u64=0x8}, @generic="1fe758f3d80f7782c8a77b59ff4ec29ca95dd3c9dd5a2f90cefa4f905479ea05cc81f46e02cfb032f1b83301a26e3ba4dd1e027413efa42dc734056ed3b5f4119f1a91efca258c47073571f4ac83871f66e00b635ff12ba04a87bd445aaf90fe6ecfcf75bed667eebb0207ed264990859d63fe22d4200415250ef195445069ae583c39705d5e39a79e4c", @typed={0x8, 0x95, @u32=0x6}, @typed={0xc, 0x5d, @u64=0x2}]}]}, 0x16ac}, 0x1, 0x0, 0x0, 0x10}, 0x1) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000000c0)={&(0x7f000000c000/0x2000)=nil, 0xff9, 0x4, 0xea, &(0x7f0000005000/0x4000)=nil, 0x94d}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.stat\x00', 0x0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001bc0)={0x1, 0x0, [{0x3002, 0xce, &(0x7f0000001ac0)=""/206}]}) 10:32:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}) 10:32:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}) 10:32:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00p', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:58 executing program 1: unshare(0x8000000) semget$private(0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") semget$private(0x0, 0x400000000004048, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8001, 0x20400) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 10:32:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}) 10:32:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00P', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:58 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x9, 0x7, 0x10000, 0x3, 0x9}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000040)="ca3433262ae61f40fd39905307c694d5a9fd6549d82d36aa177bb321287a2d38bf807944eaaf8cdf6d81d741f5587aee8e74f46b9e35ab6228ef0d", &(0x7f0000000080)=""/37}, 0x18) socket(0x15, 0x5, 0x453) 10:32:58 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) connect$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) 10:32:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}) 10:32:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x20, 0x80) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x1000000}, 0xc) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0x7, 0xfffffffffffffffe, 0x0, 0x4}, 0x6) 10:32:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}) 10:32:59 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0xfffffffffffffc01, 0x0, 0x7fffffff, 0x4, 0x2, 0x800, 0x2}, 0xc) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sendmsg(r2, &(0x7f00000038c0)={&(0x7f0000000580)=@ethernet={0x306}, 0x80, &(0x7f0000003840)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="58cfaac9397721024d727370000c3b9b1408f0a01304a8db2e95aa7a957f6381d5b60024ed4f992066bcf674ba5ec2d63f94df2f675223b434ae36cf4c3a72a59b9dba3c0f62d2a1d0a8eb931f1ece7a6d6d0ee6a4e9e4c1b9f05a792e223ee786cd78ca50b1caf0617257cdede8380726a3327c9e36922df19b1a669be679dde6e173337eacb05874bce30e4776bb7e99f6b262f38535e5636799f9cdd4b8957d575492b498d524d729aea85f94bff856941afdaad9cf13b2312e668cd48490", 0xc0}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="604ff5fa1442f68d71ceb07d81cbd3ce51723c7b1548485789bd23ce31c2ec13425f38dc8e066f9c33bf1fb52aae516a3218b4ad4677441dde9217db285cba63ea7770c13aeddd006aa7c7a2d42c340c1c01b3d315ef33b742318f7330f38b80936a", 0x62}, {&(0x7f0000002740)="fd28f26e71bcfb0a99f43b3ca875ed7e5eb916a048e23511ed36bbdd0137bad0a50803c01d95e841ec783ce71bb7546b60ee9ab347e6a0dd8360a414d534", 0x3e}, {&(0x7f0000002780)="064487062f99be3153c75750738aee1d3145d3ec058ec4943e3c2bca5d6bc86a70a14c2c8996fc778bf814692b8073ddc2cea3ecc197fe5e38f9d3b318c1574f36098b43b09d27ea3f6f084dea74c006a6de1c0fd3f0dce759de315fe8241bb52a570b8ef7de825e72f2a1fedba22d2a56ae965cb3f86d496fcb25eec4124cab3c69699399a5efb7c49402429f2316e99b9991e964efb671bf256638d807ea1bda30a1fec40b2a6d8301289709f88fbb21a6db44d4d9da04739c746a8a66f0c3", 0xc0}, {&(0x7f0000002840)="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", 0x1000}], 0x7}, 0x20000804) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, 0x0, 0x0) r3 = dup(r2) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000080)={{0xa, 0x6, 0x5, 0x51, 'syz0\x00', 0x7}, 0x0, [0x4, 0x7, 0x2724, 0x8, 0x4, 0x81, 0xe40, 0xffffffffffffff81, 0x1, 0x2, 0x0, 0x6, 0x2d5e, 0xfffffffffffffffa, 0x81, 0xfffffffffffffffc, 0x101, 0xffffffffffffff01, 0xe9b, 0x2c045880000, 0x80, 0x4ffa, 0x0, 0x5, 0x1, 0x8000, 0x95a3, 0x610a, 0x200, 0x6, 0x28, 0x84, 0x25, 0x2f, 0x3f, 0x255a2fd3, 0x7, 0x42, 0x80, 0x6e, 0x8, 0x4, 0x3, 0x1a, 0x7, 0x4, 0x7fffffff, 0x1, 0x6, 0x2, 0x92, 0x8, 0x4, 0x1f, 0xc6cf, 0xff, 0xffffffff, 0x8, 0xf0, 0xffffffffffff9330, 0x1, 0xcb6, 0x2, 0x3, 0x3, 0x8001, 0x8, 0x7, 0x9, 0xfffffffffffffffb, 0x100000000, 0x8, 0x6, 0xfffffffffffffffd, 0x3, 0x9, 0x1, 0x9, 0x1000, 0xffffffff00000000, 0xfffffffffffff4eb, 0x862d, 0x1, 0x5, 0x3, 0x8, 0x2, 0x9, 0x4b, 0x0, 0x3f, 0x5, 0x965, 0x9ee3, 0x3f, 0x3f, 0x4, 0x5, 0x3fd0, 0x4, 0x1, 0x2, 0xfffffffffffffffc, 0x0, 0x9, 0x3800000000000000, 0x6, 0x4, 0x0, 0x2, 0x0, 0x7, 0x1f, 0x5, 0x40, 0x0, 0x3, 0x5, 0x40, 0x8, 0x81, 0x289, 0x27c, 0x7fffffff, 0x4, 0x728c, 0x4, 0x7], {0x77359400}}) ioctl$KDSETMODE(r3, 0x4b3a, 0x4) close(r2) 10:32:59 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 10:32:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}}) 10:32:59 executing program 1: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x6, &(0x7f0000000680)=[{&(0x7f0000000280)="e475d5336e30382293a2a8baef30ef30c30088c0e5f4779cd24506d315d80c9cf7505098c961796f8e8a7b7599aee8ddd4f1c21af46aa47644715ef803e079b3b152fec7fe69cd34721f33c5e07b3bb2ccd4c43adf09747177ee7bb73d238ba29889cd3e6a8e47446f9005d5093a71", 0x6f, 0x325a}, {&(0x7f0000000300), 0x0, 0x1000}, {&(0x7f0000000340)="9467c0ce31596f2b922bd72bb7cdfa6ae4fa57795ebaa4444398f2fff19438ff32e531f5de2778a2e6de4b8b7edb3c72869eefbc7ef415119ece7f683ec95b5f83fac60792a16c3efbb61b46bf3384dea3481e0c8f3d53441e3e4c87460eadade493592b19ca311b0cacae4b7b4beffbcd662a24231a4f5d7f432134744b2afa12ba9eaf29d53d5cff6df71bd93ceae1a6ad13405223ce63f4f223cc680eb902bac6cd9c117a72f4949451e3cb02c7ba83337d89a6cca6e378dac70991ff2153910b64eeb1e44caf348700ede9ac1c19d1167daec3b2adec5f6a", 0xda, 0x6}, {&(0x7f0000000440)="b34f47525150736c8e9133ccb26eae7f0c45acf41b804c1cb26e20d50f7de24b45fbd8be164990cdf7f9cb2556f69faf9d0eaf533b1ba35fbcea4c1dd0a259d9a9532ae8576e434da0c9cff6fcceecfd135bc53bc2cca07f14d99bba02317a09dfcd450c1227b0dbc15f5037b813f398bcdf604b762f2330bbf177e1de264666c2d43305616a0cc3d67ce345b8bc7c843c2c2707e82d36f174f355497e1fa9700520afe2dbf38ff433a221e4b3ff0927aacc58a7d92f965a2669f80e9f820ccc908b7d80c6be6e54ee857726ddf04ac390b2eacc9946c497270a5ce64beddf8fc4c43f", 0xe3, 0x7ff}, {&(0x7f0000000540)="747816c4f2a478ffcae13d9eff5270d15e815087014ea042665a67db8f592bc1f20c029fd82aeb1a98582489449b2d2a1c030677e186b53a7f96f6e6cb9b4cf5c6d198d7b6e9721c30744193ae71ac7c7754bd9e196a4221726ee084daf89d18f195dc39e21ec4a1d7d22580712b6b6780ca0c568c5b9f35ccc8a2aaba862b11bd384e9eab1bcad11e211023de661bcd8792a85b598a11b9baa2c24f08e7a844db490a41bd3c32edaaa5aea5b6d66e777eb8ef62b6310b4f808b13143cff713086f1a64860c19fa3f8ed915d739be0ea40138304eeb15ef913172b4d766d", 0xde, 0x61}, {&(0x7f0000000640)="bad40addaca076cb85d48bd5dd1dbbccb4feb55371467385a8d547", 0x1b, 0x4}], 0x0, &(0x7f0000000740)='wlan1}&}\'\x00') r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001000/0x4000)=nil, &(0x7f000000b000/0x2000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000005000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f00000000c0)="1f78703edde0d884f0d7540f4010d524b1cedb1dadd610bb16dc65e563bd07df1527d7368319bd7ebf0f86c88099794fd508a6ef8509c134342abe74f119d45e6ec558d36ff8b49e095c30dcf60b3ab3fee1759446e3a527dc2efa4f2f84553d96592e555094339bca2290d1cf7a4a973938e49943e48eb7f2bf3a5b9a1ef3c2881f8b14f8d12cb87fb73e97be71aecfd65799cedccf6204d56747a6fe03d4b97537ba84beb8d83f96b35effb03eb3df2d9711b9f8af5a58fe26fb00f2c64521ebe9de6940739ba0f0fa92535975e291c1d6ec1c3088cb52a393750b0280ea18d54091c1e1", 0xe5, r0}, 0x68) 10:32:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x92, 0x4) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x840, 0x4) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 10:32:59 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:32:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}}) 10:32:59 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:32:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) mmap$xdp(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x180000000) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:32:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0xaa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c000000a700c1421e0079ddd61f5210776adf8df6fd88bd8cbda7016ad55a3f297353cc7ba8105cd7e1ab565e0a2327a1e6e7d73926d1817fb4e78029783175ba35c033ab4b6e5a7357b227d893b087c0108473d904ff7f39e3ec2e8110923611b978a12c2a9c5b2464ffa06b996b969c8cfb8acd6403fee7a25d8801622d38ee37eb347e006af81001a4809c4cc22d9d7b5184fb5c79718ff1c5b44e566101f14b3cd049436510b6307b935db0579a00000000"], 0xad) r1 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) getgroups(0xa, &(0x7f0000000140)=[0xee01, 0x0, 0xee00, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) syz_mount_image$vfat(&(0x7f0000000780)='vfat\x00', &(0x7f00000007c0)='./bus\x00', 0x6, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000800)="312903e59fa8f3b5f6c0177fdd88798529dbae227331dc6f115b0b1e13cc88183ce53a9b81fbfcec5bff81f878974eb878e9c9158c451f7efe39809a2bdb1945c4296a99dcfb30bc8f7335e380ca7244c7bdafea22d817e0c3680de6b2bf56cda32c70a7cee27643358b4cbc8f42d9c33ecae748bf98994ad25aa6", 0x7b, 0x4}, {&(0x7f0000000880), 0x0, 0x5}], 0x2001, &(0x7f0000000900)={[{@iocharset={'iocharset', 0x3d, 'maccroatian'}}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}, {@shortname_win95='shortname=win95'}, {@rodir='rodir'}], [{@hash='hash'}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0x800}, 0x4000) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x8200) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r7, 0x40045731, &(0x7f00000000c0)=0x9) truncate(&(0x7f0000000280)='./bus\x00', 0x0) 10:32:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:32:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:00 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}}) 10:33:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10000, 0x8000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x2, 0x2}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000000, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0xaa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="0c000000a700c1421e0079ddd61f5210776adf8df6fd88bd8cbda7016ad55a3f297353cc7ba8105cd7e1ab565e0a2327a1e6e7d73926d1817fb4e78029783175ba35c033ab4b6e5a7357b227d893b087c0108473d904ff7f39e3ec2e8110923611b978a12c2a9c5b2464ffa06b996b969c8cfb8acd6403fee7a25d8801622d38ee37eb347e006af81001a4809c4cc22d9d7b5184fb5c79718ff1c5b44e566101f14b3cd049436510b6307b935db0579a00000000"], 0xad) r1 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) getgroups(0xa, &(0x7f0000000140)=[0xee01, 0x0, 0xee00, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) syz_mount_image$vfat(&(0x7f0000000780)='vfat\x00', &(0x7f00000007c0)='./bus\x00', 0x6, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000800)="312903e59fa8f3b5f6c0177fdd88798529dbae227331dc6f115b0b1e13cc88183ce53a9b81fbfcec5bff81f878974eb878e9c9158c451f7efe39809a2bdb1945c4296a99dcfb30bc8f7335e380ca7244c7bdafea22d817e0c3680de6b2bf56cda32c70a7cee27643358b4cbc8f42d9c33ecae748bf98994ad25aa6", 0x7b, 0x4}, {&(0x7f0000000880), 0x0, 0x5}], 0x2001, &(0x7f0000000900)={[{@iocharset={'iocharset', 0x3d, 'maccroatian'}}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}, {@shortname_win95='shortname=win95'}, {@rodir='rodir'}], [{@hash='hash'}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90, 0x800}, 0x4000) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x8200) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r7, 0x40045731, &(0x7f00000000c0)=0x9) truncate(&(0x7f0000000280)='./bus\x00', 0x0) 10:33:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000100)=""/4096) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:00 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x01\xa0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}) 10:33:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}}) 10:33:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f0000000000)='wlan1\x00', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r0, &(0x7f0000000100)={0x2a, 0x37, 0x1, {0x2, 0xffffffffffffffc0, 0x6, r1, 0xc, 'security)@(!'}}, 0x2a) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}}) 10:33:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xff\xc3\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:00 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:00 executing program 2: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000002940)) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x7a, &(0x7f0000000040), &(0x7f0000000140)=0x20000048) 10:33:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000340)={'filter\x00'}, &(0x7f0000000200)=0x54) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000180)={@rand_addr, @empty, @remote}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={r1, @in={{0x2, 0x4e24, @broadcast}}, 0x7ff, 0xfffffffffffffffc, 0x624, 0x5, 0x2}, &(0x7f0000000240)=0x98) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x89\xf0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}}) 10:33:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:01 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000000c0)={0x1, 0x0, {0x6, 0x2b5, 0x3, 0x5}}) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff}}) [ 1025.532119][ T1940] Error parsing options; rc = [-22] 10:33:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xff\xfe\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10100, 0x2) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) 10:33:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x209, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0xfffffffffffffffd, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:01 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}}) 10:33:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1026.197017][ T2076] Error parsing options; rc = [-22] 10:33:02 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") splice(r0, &(0x7f0000000080), r0, &(0x7f0000000100), 0x6, 0x2) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='adfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000280)=""/121, 0x79) 10:33:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x400000001000004, 0x1, 0x100003) mremap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) 10:33:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}) 10:33:02 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xc3\xff\xff\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1026.534774][ T2100] Error parsing options; rc = [-22] 10:33:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}}) 10:33:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xfe\xff\xff\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1026.651997][ T2148] overlayfs: overlapping lowerdir path 10:33:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8000000006, 0x1fe) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x3, 0x2, {0xa, 0x4e23, 0x100000000, @rand_addr="c4801b609f913aba65e314d1f525b9c5", 0x4}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="70c1eba8149b96cdd45431617cac841cb0e73c70cab2e0176309eafd26d738d321c095ec54e223dfa1f9b089ff61b460f9c8a28753f730426f7b469b36800971f9c27c7f6d5e7bae1866527b12e4a00a5478183044392a7cbf939bc2e3e951464954816dedf90ea840dd167969c0a5d260185f7310af8a49e5683a1621f50b580241a6f2357141b1e4b0644b1e37bb824b2e43f1f4dcbf51b9d86d7a3265939fcf0ebadcfdf8d3e4d0de94078f5fe4c3440a962e3d45", 0xb6}], 0x1}, 0x20000000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:02 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1026.794088][ T2106] overlayfs: unrecognized mount option "./file0" or missing value 10:33:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:02 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x80000) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f00000002c0)=0x54) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:hald_exec_t:s0\x00', 0x21) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) r4 = getpid() r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40040400}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x18, r5, 0x700, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r6 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) kcmp(r3, r4, 0x3, r6, r0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000500)=ANY=[@ANYBLOB="030000000000000000f0000000000000dd00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/221], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd00000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00'/253], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0xb, 0x1}) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f0000000680), &(0x7f0000000180)=0x30) 10:33:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xff\xff\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}}) [ 1026.947775][ T2231] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x2000003, 0x8000000, 0x100000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1027.049620][ T2231] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1027.099069][ T2231] Error parsing options; rc = [-22] 10:33:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:03 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x1fffd, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000100)={0x1, 0x10, 0x40, 0x8001, "9ea539fafb927856e09713c86fdbce799bd0f8a63794673400"}) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x7af, &(0x7f00000000c0)=0x4) 10:33:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc3}}) 10:33:03 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1027.489306][ T2369] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1027.525722][ T2369] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1027.548200][ T2369] Error parsing options; rc = [-22] 10:33:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x8000000, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@l2, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f000000e000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:03 executing program 2: mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x0, 0x4100) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) socket$unix(0x1, 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) link(&(0x7f0000000000)='./file0/file1\x00', &(0x7f00000001c0)='./file0/file1\x00') r2 = getegid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) read$FUSE(r1, &(0x7f0000000900), 0x1000) unlink(&(0x7f0000000140)='./file0/file1\x00') chdir(&(0x7f0000000040)='./file0/file1\x00') r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000280)={0x200, 0x3f, 0xffffffff, 0x0, 0xc24e, 0x9, 0x10001, 0x1, 0x1, 0x5, 0x20, 0xfff, 0x0, 0x6, 0xe5a6, 0x1c32d723, 0x4a4, 0x7, 0x80}) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x2}, 0x90) 10:33:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x7f\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}) 10:33:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x01\xa0\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:03 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:03 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x8, 0x10) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0xffffffffffffffff, 0x1b071, r0, 0xfffffffffffffffe) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}) [ 1028.036392][ T2522] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1028.062180][ T2522] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00`\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1028.101825][ T2522] Error parsing options; rc = [-22] 10:33:04 executing program 2: r0 = getuid() setresuid(r0, 0xee01, 0x0) mount$9p_xen(&(0x7f0000000600)='bridge_slave_1\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=xen,', {[{@cache_mmap='cache=mmap'}, {@access_user='access=user'}], [{@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, '}\xf3'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x26}}, {@subj_type={'subj_type', 0x3d, 'TIPCv2\x00'}}, {@context={'context', 0x3d, 'root'}}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, 'udp\x00'}}]}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x3, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x288, r2, 0x110, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffc000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff21}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6d000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f0000}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x92}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xf0c, @empty, 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7ff, @empty, 0x400}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffde19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xabb2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb77}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa26e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x136}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x800}, 0x81) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000780)={0x0, 0xff, 0x6, [0x7fffffff, 0xaed, 0x1f, 0x8, 0x0, 0x7f]}, &(0x7f00000007c0)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000580)={r4, 0x90, &(0x7f00000004c0)=[@in6={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200}, @in6={0xa, 0x4e23, 0x1, @remote, 0x9}, @in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x20}, 0x5}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x4, @local, 0xe1c6}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f00000005c0)=0x10) 10:33:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}) 10:33:04 executing program 1: remap_file_pages(&(0x7f000000c000/0x4000)=nil, 0x4000, 0x0, 0x10001, 0x84003) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f00000000c0)=0x800, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) 10:33:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}) 10:33:04 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) write$P9_RAUTH(r1, &(0x7f0000000140)={0x14, 0x67, 0x2, {0x0, 0x3, 0x6}}, 0x14) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="348caabf4fbe30939634582ae292404ba4ea14dfaf97a5ce5c5f577a770174f99cf89e0dd2c54259ed9c4b3a35a1611642197084268cc0f77b6e9cd9f14da421504421b26dc05df8a818b4a7258f9f5a2d955f7e297a6a7d8c815dc27d85bcd58b15fb3cee398b4485b54471d094fdeb93e2aef271d2d4fbef650d71d616829cdec53a2014e25b2893d3da695c23ca6f46fd5f324e6ea72670c88ac16547142965e5685a90a509db8ec2831b5fc9585a02c01d0bc084eceb7300496e7fd7"], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000002c0)=0xc) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r3, r4, r5) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000500)=0x9, 0x4) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000680)={0x1000, 0x7, 0x1}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x80, 0x0) r6 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="874937e1173f1459419710756e39af953013744b0798cf489ab93f2e01f8c0b9b3601c1f52c424d859885d3df039dea5e880c742f30b947d8617d2da09b628cc94c854fcb1"], 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000540)={0x40, 0xff, 0xc, 0x8, 0x9, 0x8, 0xf75, 0xeef}, &(0x7f00000006c0)=0x20) ftruncate(r6, 0xfffffffffffffff9) sendfile(r0, r6, 0x0, 0x88000fbfffffc) 10:33:04 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x401, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x1ab, 0xfa00, {r1, 0x3, 0x0, @in6={0xa, 0x4e24, 0xea, @empty, 0x40}}}, 0x224) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) 10:33:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1028.700999][ T2672] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}) 10:33:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2}}, 0x20) [ 1028.774120][ T2672] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) sendto$isdn(r0, &(0x7f0000000140)={0x0, 0x0, "eb2c4f22f07aa2de0bfac26d8327dc1db594e9fef95a66fc94ad832d0ba4a0b845119d640ef2166b0d7600f8a8d087cb1bd1740684a992025183743c09b7f8c9d4d5ec2b584dba9dd1751a0524da38dec0efab832c92e6a13d6ddbaa3582e454a711395dfa86541fe0220f43ce74f290dde9"}, 0x7a, 0x40000, &(0x7f00000001c0)={0x22, 0x8, 0x9, 0x401}, 0x6) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1028.943488][ T2672] Error parsing options; rc = [-22] 10:33:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:04 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0), 0x2) fcntl$setsig(r0, 0xa, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x20040, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x800033001e00) 10:33:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:05 executing program 1: getpid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}) 10:33:05 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1029.218551][ T2821] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1029.229305][ T2821] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1029.242982][ T2821] Error parsing options; rc = [-22] 10:33:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}) [ 1029.467755][ T2838] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:05 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000180)=""/146) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000000)=@short={0xb, @remote, @remote, 0x1, @rose}, &(0x7f00000000c0)=0x1c, 0x800) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000100)=@null) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 1029.541587][ T2838] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1029.607319][ T2838] Error parsing options; rc = [-22] 10:33:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1029.641955][ T26] audit: type=1800 audit(1560853985.518:92): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16541 res=0 [ 1029.673000][ T2928] QAT: Invalid ioctl 10:33:05 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x400}, &(0x7f0000000140)=0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0xc00, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x100}, &(0x7f00000001c0)=0x8) syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 10:33:05 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}) 10:33:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:05 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x1) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000140)={0x6, 0xffffffff}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{0x401, 0x4, 0x5, 0x4}, 'syz0\x00', 0xd}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1029.940556][ T2970] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1030.035705][ T2970] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}) [ 1030.089906][ T2970] Error parsing options; rc = [-22] 10:33:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:06 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000080)) 10:33:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:06 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}) 10:33:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) bind$bt_rfcomm(r0, &(0x7f0000000200)={0x1f, {0x3, 0x0, 0x52, 0x1, 0x916c, 0xffffffffffffffff}, 0x80000001}, 0xffffffffffffff7a) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x480080, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000100)=0x5, 0x4) mq_getsetattr(r1, &(0x7f00000000c0)={0x6, 0x8, 0xc503, 0x100000000000000, 0x4, 0x2, 0x2, 0x5}, 0x0) [ 1030.518254][ T3119] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1030.606688][ T3119] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1030.695886][ T3119] Error parsing options; rc = [-22] 10:33:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(0xffffffffffffffff, 0x0, 0x0) 10:33:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}) 10:33:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000b000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000180)) pwrite64(r0, &(0x7f0000000000)="6fabf355c2feea2c1b4fce463cccb164558e4348d5f2279d50721fdd498aa09d", 0x20, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000200)={0x0, 0x1f, 0xfffffffffffffffe, [], &(0x7f0000000240)=0xf489}) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000001c0)) 10:33:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:06 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}) 10:33:07 executing program 1: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1031.194274][ T3303] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1031.247596][ T3303] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}}) [ 1031.317869][ T3303] Error parsing options; rc = [-22] 10:33:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800007, 0x8}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 10:33:07 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x100000000, &(0x7f0000000180)=""/114) syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000280)='!keyring\x00', 0x9) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f0000000240)) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000400)={r4, @multicast2, @remote}, 0xc) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x10010, r1, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x341400) write$P9_RLOCK(r5, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x2}, 0x8) r6 = openat$cgroup(r5, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) 10:33:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:07 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}}) 10:33:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}}) 10:33:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1031.870389][ T3459] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1031.886423][ T3459] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1031.916505][ T3459] Error parsing options; rc = [-22] 10:33:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000001c0)=0xe8) bind$can_raw(r1, &(0x7f0000000200)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@multicast2, @local, 0x0, 0x1, [@remote]}, 0x14) 10:33:08 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:08 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000340)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c40)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000c80)={'irlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000e40)={'ip6tnl0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000f00)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000001000)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000003580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000035c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003600)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000006b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006b40)=0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f000000c9c0)={&(0x7f000000b6c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000c940)=[{&(0x7f000000b740)=""/172, 0xac}, {&(0x7f000000b800)=""/4096, 0x1000}, {&(0x7f000000c800)=""/1, 0x1}, {&(0x7f000000c840)=""/185, 0xb9}, {&(0x7f000000c900)=""/52, 0x34}], 0x5}, 0x40) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f000000ca00)={@dev, 0x0}, &(0x7f000000ca40)=0x14) getpeername(0xffffffffffffff9c, &(0x7f000000ca80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000cb00)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f000000cfc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d000)=0x14, 0x80000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f000000d040)={@multicast2, @multicast1, 0x0}, &(0x7f000000d080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000d300)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f000000d400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000d440)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f000000d480)={0x11, 0x0, 0x0}, &(0x7f000000d4c0)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000da80)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f000000db80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000dbc0)={0x0, @rand_addr, @local}, &(0x7f000000dc00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000dc80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000dcc0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f000000ddc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000dec0)={@rand_addr, 0x0}, &(0x7f000000df00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000df40)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f000000e040)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000eb00)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000eac0)={&(0x7f000000e080)={0xa28, r2, 0x504, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x118, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1, 0x800, 0xffffffff, 0x8}, {0x0, 0x100, 0x4cb4799e, 0x100}, {0xfff, 0x9, 0x81, 0x5}, {0x5, 0x7, 0x1}, {0x0, 0x1, 0x10001, 0x6ac7}, {0x50d, 0x50, 0x7, 0x5}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x35c}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r9}, {0x68, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x252abc6f, 0x9, 0x70d, 0x9}, {0x6, 0x3cfddb10, 0x1df7896b, 0x6}, {0x7, 0x8, 0x5}, {0x80000000, 0xfe6, 0x3, 0x80000001}, {0x9, 0x0, 0x0, 0x2}, {0x10001, 0x0, 0x0, 0x101}]}}}]}}, {{0x8, 0x1, r10}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x104, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r17}, {0x1ec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x234, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xeb1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3, 0x4, 0x3f, 0x5}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r24}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x19}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r26}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r27}, {0x124, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2028}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}]}, 0xa28}, 0x1, 0x0, 0x0, 0x8001}, 0x8084) r28 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x8, 0x2400c0) r29 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r28, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r29, @ANYBLOB="00062bbd7000fbdbfd2501000000000000000241000000a8b9586574683a74756e6c30000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) ioctl$sock_inet_SIOCADDRT(r30, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @rand_addr=0x7fffffff}, {0x2, 0x4e22, @rand_addr=0xfffffffffffffffa}, {0x2, 0x4e24, @rand_addr=0x1}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x513}) 10:33:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}) 10:33:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1033.000652][ T3593] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}}) 10:33:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1033.081187][ T3593] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1033.138505][ T3593] Error parsing options; rc = [-22] 10:33:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/raw6\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/188, 0xbc}], 0x1, 0x0) 10:33:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}}) 10:33:09 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10001, 0x20001) write$tun(r0, &(0x7f00000000c0)={@val, @val={0x0, 0x3, 0x4, 0x3f, 0x3, 0x7f}, @ipv6={0x0, 0x6, "7827e8", 0x107, 0x32, 0xffffffff, @empty, @loopback, {[@srh={0x7f, 0xa, 0x4, 0x5, 0x3ff, 0x48, 0x5, [@rand_addr="0dbc7c29f64690c8fed9dea0d918adf1", @rand_addr="821fecf3714dbea16b160012f105bdae", @mcast1, @loopback, @loopback]}], @dccp={{0x4e22, 0x4e24, 0x4, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, "c9b34d", 0x9, 'e?5'}, "c54f06f67d6203baafaae70f11398002a860b718f462819f61bb8e9aea1833fe6574665d6a34a13bf85824b47038540bf7692477d2f1e4cee3e23e28a9469d358cf34f0ac780f491167ff8b99097ef5665b84f1503f9e5ba7a71139965f29a225140b299e642c545d8c8e82141ea868b70171ac84f8fe549eb1540f8653f3ab295a889c1999085e3b723e672970a627409fa326ec8a21d7148061a0b847d5c"}}}}, 0x13d) 10:33:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x01\xa0\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff00000000}}) 10:33:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1033.614215][ T3745] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x400000, 0x3) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) [ 1033.724135][ T3745] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1033.789034][ T3745] Error parsing options; rc = [-22] 10:33:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:09 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x404001, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0xf, 0x2}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1000002, 0x1b071, 0xffffffffffffffff, 0x2e) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:09 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 10:33:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}}) 10:33:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000000040)=0x5, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00cbe) 10:33:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:10 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x103900) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x3, r1, 0x1f, r2}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00cf2) 10:33:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}) 10:33:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:10 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000b000/0x2000)=nil, 0x2000, 0x1000001, 0x8010, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}}) 10:33:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 10:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x10000, 0x8d, 0x10001, 0xfffffffffffffffd, 0x0, 0x8, 0xa1080, 0x2, 0x7, 0x9, 0x7, 0x4871, 0x10001, 0x1ff, 0x80, 0x0, 0xde16, 0x2, 0x1000, 0x8, 0x400, 0x1, 0x7, 0x1, 0x6, 0xffff, 0x2, 0x100, 0x2, 0x7, 0x10001, 0x400, 0x6, 0x1000, 0x6, 0x8, 0x0, 0x1ff, 0x2, @perf_config_ext={0x6, 0xe4}, 0x404, 0x7ff, 0x0, 0x5, 0x1000, 0xfff, 0xfff}, r1, 0x4, r0, 0x2) 10:33:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}) 10:33:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:11 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000070000004c000000000000009500000000000000aac782ebc4f9f0605110d855d4104f7a8ad04984b513feeabcac05ebea27800118df4dcd3d5a2b778595f84763e3c82f764302f77ae6ecfd99d4c034"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 10:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:11 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xa, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 10:33:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 10:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x1b071, r0, 0x2c) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0xfff, 0x7, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f00000000c0)={0x34e, 0x10001, 0x7, 0x5, 0x5, 0x3}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000001c0)={0x3ff, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1, 0x3, [{{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e24, @rand_addr=0x3}}]}, 0x210) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:11 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x21) close(r0) 10:33:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000080)={0x5}, 0x1db) fchmod(r0, 0x0) recvfrom$inet(r0, 0x0, 0x518db98b, 0x2, 0x0, 0x800e0065e) shutdown(r1, 0x0) 10:33:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 10:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='&\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x2, &(0x7f0000000100)='.\x00', 0xffffffffffffffff}, 0x30) tgkill(r1, r2, 0x8) 10:33:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:12 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) socketpair(0x2, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00831) 10:33:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e008d7) 10:33:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='\x00', 0x0, r1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) 10:33:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @hyper}, 0x10) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 10:33:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) 10:33:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) 10:33:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000980)='/dev/snd/pcmC#D#c\x00', 0x5e3, 0x2000) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f00000009c0)='nodev}#em1vboxnet0\x00', &(0x7f0000000a00)="22b44c386ec3225128357dfad9d783bba85d3e6fd0138db089d2f2cec4350486d77bbc255df41da27dc0fd8ebd5dd59b081ae2", 0x33) r2 = gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) write$binfmt_aout(r0, &(0x7f0000000140)={{0x1cf, 0x7f, 0xcc4, 0x237, 0x2b8, 0x8000, 0x198, 0x7fff}, "e3f5cfceb1cd31c41aed2785c1b742a1afec542508d7f7c1dc7e725a2b64f979683afc70b7c7835fd0c4ca2bdb7458a15ab6fb0f74e453f78d9cbb73f9696ab233bf99507cf112bbd76839e8cf5f424e1506c2b800b616e23cb0af86a5e81b3ba2a7611f83b500e583c4a3580604aa5b728cbde348e4b15603f6527e6a3621031162a404d13ca7767e9ffb0ee4405900a024455493d8d561b875e269a99be3a2b3eb5db127b7ef314dc28bb62859e4ce35d00f67a23f2e587ca1d91ddfa8c625a4e5e6643673a103cf7d44c5486c452488354db23e786741e7efcb50edb6af206c", [[], [], [], [], [], [], []]}, 0x801) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) rt_tgsigqueueinfo(r2, r3, 0x37, &(0x7f0000000a40)={0xc, 0x81, 0x800}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000005000/0x3000)=nil) 10:33:13 executing program 3: pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000001c0)}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x2}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, &(0x7f0000000040)={0x5, {{0x2, 0xffffffffffffffff, @broadcast}}}, 0x90) recvfrom$inet(r0, 0x0, 0x2a0b1e03, 0x0, 0x0, 0x800e005ee) shutdown(r0, 0x0) 10:33:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, 0x0, &(0x7f0000000040), 0x0) recvfrom$inet(r0, 0x0, 0x1012b, 0x2, 0x0, 0x800e008a7) shutdown(r0, 0x0) 10:33:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xe0P\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 10:33:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/235, 0xeb}, {0x0}], 0x2}, 0x2) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000001800)=[{&(0x7f0000000340)=""/250, 0xfa}], 0x1) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e0080e) shutdown(r2, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/66, 0x42}], 0x1) shutdown(r3, 0x0) 10:33:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) 10:33:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00q`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:13 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 10:33:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xd0p\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 10:33:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000240)) dup3(r4, r3, 0x0) tkill(r2, 0x1000000000015) 10:33:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}) 10:33:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00`q\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}) 10:33:13 executing program 3: unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:33:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:14 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 10:33:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}) 10:33:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:14 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000040)=0x2, 0x4) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) 10:33:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}}) 10:33:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) 10:33:14 executing program 3: sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) 10:33:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00p\xd0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00P\xe0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:14 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 10:33:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}) 10:33:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000100)=ANY=[@ANYBLOB=')$']) 10:33:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:33:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}}) 10:33:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) 10:33:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 10:33:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}}) 10:33:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) 10:33:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}) 10:33:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xd) ioctl$KDGKBENT(r0, 0x4b46, 0x0) 10:33:16 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000380)="f1c8a3338fe2c7ae84358c9bb55fd0b3d22b176c503da3709db7672bc217c2b8a1fe0b795ac0f9701a7d6926ec1b1e20f02b9b820b29b03045fe7a667aed2fbb9fe797f1391b8130d13e51ac105ee9013508b5f05b3cae351953ce86f4b486fadcfe34c03a6af39d7fb1ba487f6e5ff9c51060f533c44a0cdf0eb027574ae9444aa0f9f8e735b0b12384e8e7cf3ad6f8a0750a0b96a5cb407e10161e9525d9d75ba26a403a7cf0cd330ada30c065eab998c926e1fe9fa5187a8bab8d734791f325b21c260025332974", 0xc9, 0x0, 0x0, 0x0) shutdown(r1, 0x1) 10:33:16 executing program 1: sched_setaffinity(0x0, 0x2d4, &(0x7f0000000740)=0xfffffffffffffffa) move_pages(0x0, 0x1fffffb9, &(0x7f0000000140)=[&(0x7f0000ffc000/0x3000)=nil], 0x0, &(0x7f00000002c0), 0x0) mlockall(0x1) 10:33:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}) 10:33:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000042726b7600f7b16fc782"], 0x10}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)}}], 0x400001f, 0x0) 10:33:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:16 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000200)={'syz0'}, 0x4) 10:33:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}) 10:33:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:18 executing program 1: socket(0x1e, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) 10:33:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") ioctl$LOOP_GET_STATUS(r0, 0x4c05, &(0x7f00000001c0)) 10:33:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}) 10:33:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xf0\x89\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:18 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000200)={'syz0'}, 0x4) 10:33:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}) 10:33:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x89\xf0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000011b, 0x7a00) 10:33:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}) 10:33:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x11, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 10:33:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}) 10:33:19 executing program 3: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$P9_RSTATu(r0, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES32]], 0x4451417f) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000440)) 10:33:19 executing program 2: 10:33:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}}) 10:33:20 executing program 1: 10:33:20 executing program 2: 10:33:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:20 executing program 3: 10:33:20 executing program 1: 10:33:20 executing program 2: 10:33:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}}) 10:33:20 executing program 3: 10:33:20 executing program 1: 10:33:20 executing program 2: 10:33:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:20 executing program 1: 10:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}}) 10:33:20 executing program 2: 10:33:20 executing program 3: 10:33:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:20 executing program 1: 10:33:21 executing program 3: 10:33:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}) 10:33:21 executing program 2: 10:33:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:21 executing program 3: 10:33:21 executing program 1: 10:33:21 executing program 2: 10:33:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:21 executing program 3: 10:33:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}}) 10:33:21 executing program 1: 10:33:21 executing program 2: 10:33:21 executing program 3: 10:33:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x01\xa0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:21 executing program 1: 10:33:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}}) 10:33:21 executing program 2: 10:33:21 executing program 3: 10:33:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:21 executing program 1: 10:33:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x0f', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}}) 10:33:22 executing program 3: 10:33:22 executing program 2: 10:33:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00`\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:22 executing program 1: 10:33:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00?', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:22 executing program 3: 10:33:22 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@local, @local, [{[], {0x8100, 0x0, 0x2e1}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @loopback}}}}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00cf2) 10:33:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}) 10:33:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xff\xff\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000000040)=0x5, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/111, 0x6f}, {0x0}, {0x0}], 0x3}, 0x2) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00cbe) 10:33:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000140)="070c7dfb", 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) msgget$private(0x0, 0x120) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007a5) 10:33:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}) 10:33:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x90\x1cWU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}) 10:33:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) recvfrom$inet(r0, 0x0, 0xc77c4c49, 0x0, 0x0, 0x800e007e0) shutdown(r0, 0x0) 10:33:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xb0\x1eWU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}) 10:33:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001200)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007a5) 10:33:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) utimes(0x0, &(0x7f0000000080)={{0x0, 0xfffffffffffffff9}, {0x8001}}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00457) 10:33:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xff\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}) 10:33:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000140)="070c7dfb", 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001200)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007a5) 10:33:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}) 10:33:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\xff\xef\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}) 10:33:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000040)={@local, @multicast1}, 0xc) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00840) 10:33:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x412, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x800e0050e) 10:33:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}) 10:33:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x2}, 0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x2a0b1e03, 0x0, 0x0, 0x800e005ee) shutdown(r0, 0x0) 10:33:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}) 10:33:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00UUW', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xff\xc3', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/16, 0x10}, {0x0}, {0x0}], 0x3}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e006cd) shutdown(r1, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/163, 0x56}], 0x241) shutdown(r2, 0x0) 10:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00UUW', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}) 10:33:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x14, r1, 0x305, 0x0, 0x0, {0xe}}, 0x14}}, 0x0) 10:33:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xc018aec0, &(0x7f0000000140)={0x0, 0x0}) 10:33:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000000040)=0x5, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {0x0}], 0x2}, 0x2) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00cbe) 10:33:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x89\xf0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}) 10:33:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xfd\xfd', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}}) 10:33:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000500)={'syz0\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x0) 10:33:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xff\xfe', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x2}}) 10:33:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1050.001149][ T6599] input: syz0 as /devices/virtual/input/input20 10:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}}) 10:33:26 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001401000002000000000000000000000003d156352c68f1b6c3ede2afe48a90d4"], 0x28}, 0x0) 10:33:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000014c0)="11dca5055e0bcfec7be070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) 10:33:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="18950000000000000000000001000000"], 0x0, 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 10:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}}) 10:33:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xfd\xfd\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:26 executing program 1: inotify_init1(0x0) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000200)={0x9, 0xc6, 0x100, 0xc3c, 0x8, 0xfffffffffffffffd, 0xffffffff, 0x5b}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={0x5}, 0x8}) 10:33:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}) 10:33:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xc3\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:26 executing program 2: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r0, 0x0, 0x0) 10:33:26 executing program 3: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 10:33:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xfe\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}}) 10:33:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40000009}) 10:33:27 executing program 3: getrandom(&(0x7f0000000100)=""/80, 0x50, 0x2) 10:33:27 executing program 1: 10:33:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}}) 10:33:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:27 executing program 3: 10:33:27 executing program 2: 10:33:27 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f"], 0x1) finit_module(r0, 0x0, 0x0) 10:33:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff}}) 10:33:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe}) 10:33:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x3, &(0x7f00000003c0)={&(0x7f0000000000)={0x20, r1, 0x305, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) 10:33:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}}) 10:33:28 executing program 2: 10:33:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:28 executing program 1: 10:33:28 executing program 3: 10:33:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:28 executing program 3: 10:33:28 executing program 1: 10:33:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:28 executing program 2: 10:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}) 10:33:28 executing program 3: 10:33:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:28 executing program 1: 10:33:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:28 executing program 2: 10:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}}) 10:33:28 executing program 3: 10:33:28 executing program 1: 10:33:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:28 executing program 2: 10:33:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}}) 10:33:29 executing program 1: 10:33:29 executing program 3: 10:33:29 executing program 2: 10:33:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:29 executing program 3: 10:33:29 executing program 1: 10:33:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc3}}) 10:33:29 executing program 2: 10:33:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:29 executing program 3: 10:33:29 executing program 2: 10:33:29 executing program 1: 10:33:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}) 10:33:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:29 executing program 1: 10:33:29 executing program 3: 10:33:29 executing program 2: 10:33:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}) 10:33:30 executing program 3: 10:33:30 executing program 1: 10:33:30 executing program 2: 10:33:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:30 executing program 3: 10:33:30 executing program 2: 10:33:30 executing program 1: 10:33:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}) 10:33:30 executing program 3: 10:33:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:30 executing program 1: 10:33:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x7f\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:30 executing program 2: 10:33:30 executing program 3: 10:33:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}) 10:33:30 executing program 1: 10:33:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x01\xa0\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:31 executing program 3: 10:33:31 executing program 1: 10:33:31 executing program 2: 10:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}) 10:33:31 executing program 3: 10:33:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00`\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:31 executing program 2: 10:33:31 executing program 1: 10:33:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:31 executing program 3: 10:33:31 executing program 2: 10:33:31 executing program 1: 10:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}) 10:33:31 executing program 3: 10:33:31 executing program 1: 10:33:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:31 executing program 2: 10:33:31 executing program 3: 10:33:31 executing program 1: 10:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}) 10:33:32 executing program 2: 10:33:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:32 executing program 1: 10:33:32 executing program 3: 10:33:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}) 10:33:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:32 executing program 2: 10:33:32 executing program 1: 10:33:32 executing program 3: 10:33:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}) 10:33:32 executing program 1: 10:33:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:32 executing program 2: 10:33:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:32 executing program 3: 10:33:32 executing program 1: 10:33:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}) 10:33:33 executing program 3: 10:33:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000b00)='/dev/loop#\x00', 0x0, 0x102) fallocate(r0, 0x20, 0x0, 0x100000003) 10:33:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1fb, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00962) 10:33:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000140)) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x25, 0x0, 0x0, 0x800e00d46) 10:33:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}) 10:33:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00b89) 10:33:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}) 10:33:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r0, &(0x7f0000001000)=[{0x0}], 0x1, 0x0) recvfrom$inet(r0, 0x0, 0xff8c, 0x2, 0x0, 0x800e0063d) shutdown(r0, 0x0) 10:33:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}}) 10:33:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) socketpair(0xffffffffe, 0x0, 0x100000004, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00b89) 10:33:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r0, 0x0, 0xd415, 0x0, 0x0, 0x800e0076f) shutdown(r0, 0x0) 10:33:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x1, 0xffffffffffffffff) shutdown(r2, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00517) 10:33:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}}) 10:33:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00845) 10:33:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}}) 10:33:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:35 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r0, 0x0, 0x0, 0x2, 0x0, 0x800e005b5) 10:33:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}) 10:33:35 executing program 2: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x5d, &(0x7f0000000100)="8fee4a81", 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@broadcast, @empty=[0xffffffff00000006, 0xf000, 0x0, 0x500, 0x0, 0xe0], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) r1 = dup(r0) syz_extract_tcp_res(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e0080d) 10:33:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}}) 10:33:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:35 executing program 3: munlock(&(0x7f0000000000/0x3000)=nil, 0x3000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x5, 0x7}, 0x8) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0039f) 10:33:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}}) 10:33:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:35 executing program 1: 10:33:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff00000000}}) 10:33:36 executing program 2: 10:33:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}}) 10:33:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:36 executing program 1: 10:33:36 executing program 3: 10:33:36 executing program 1: 10:33:36 executing program 3: 10:33:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:36 executing program 2: 10:33:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}) 10:33:36 executing program 1: 10:33:36 executing program 3: 10:33:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:36 executing program 2: 10:33:36 executing program 1: 10:33:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}}) 10:33:36 executing program 3: 10:33:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:37 executing program 2: 10:33:37 executing program 1: 10:33:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) dup(r0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00966) 10:33:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}) 10:33:37 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}, 0x10) socketpair$unix(0x1, 0x20000000000003, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 10:33:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000014c0)="11dca5055e0bcfec7be070") semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, 0x0) 10:33:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 10:33:37 executing program 1: syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 10:33:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 10:33:38 executing program 3 (fault-call:7 fault-nth:0): unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) 10:33:38 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x400}, &(0x7f0000000140)=0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0xc00, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x100}, &(0x7f00000001c0)=0x8) syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 10:33:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:38 executing program 1: r0 = memfd_create(&(0x7f0000000100)=']trustedppp0!em0mime_typetrustedself%\x00', 0x2000) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x2007d) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x410000) readlinkat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/121, 0x79) r3 = dup2(r0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x4058534c, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x04\x00', 0x0, "f9ffffffffffffff", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) [ 1062.559211][ T8187] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xa) getsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, &(0x7f0000000080)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000240)=""/173, &(0x7f0000000000)=0xad) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x2}, @sack_perm, @mss={0x2, 0x9}, @mss={0x2, 0x352e}], 0x4) 10:33:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}) [ 1062.638877][ T8187] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1062.746147][ T8187] Error parsing options; rc = [-22] 10:33:38 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:38 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x3, 0x16, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000100)=""/22}, &(0x7f00000001c0)=0x78) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) syslog(0xb, 0x0, 0x0) 10:33:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:38 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x100) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r5 = geteuid() r6 = getuid() r7 = getpid() r8 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002980)=0x0) getresuid(&(0x7f0000003c00), &(0x7f0000003c40), &(0x7f0000003c80)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005000)={0x0}, &(0x7f0000005040)=0xc) r12 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005080)={0x0, 0x0, 0x0}, &(0x7f00000050c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005100)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000005140)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000005240)=0xe8) stat(&(0x7f0000005280)='./file0\x00', &(0x7f00000052c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005340)={0x0}, &(0x7f0000005380)=0xc) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005480)={0x0, 0x0, 0x0}, &(0x7f00000054c0)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000005500)={0x0, 0x0}) getresuid(&(0x7f0000005540)=0x0, &(0x7f0000005580), &(0x7f00000055c0)) getresgid(&(0x7f0000005600)=0x0, &(0x7f0000005640), &(0x7f0000005680)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000056c0)=0x0) getresuid(&(0x7f0000005700), &(0x7f0000005740)=0x0, &(0x7f0000005780)) fstat(r0, &(0x7f00000057c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getpid() r27 = geteuid() getresgid(&(0x7f0000005840), &(0x7f0000005880), &(0x7f00000058c0)=0x0) sendmsg$netlink(r2, &(0x7f0000005a80)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8}, 0xc, &(0x7f0000004f80)=[{&(0x7f0000000300)={0x142c, 0x23, 0xc00, 0x7fff, 0x25dfdbfc, "", [@nested={0x4, 0x14}, @nested={0x134, 0x71, [@generic="37f9b9841ea361b68a833065657bb7ae522fe8e0bc1d558b9b0be9066f26fb1277cf67dd81c0abce233e01b0c49a261610b55234d1ffcdaeba6f99e8f9983aaf4e8799b1c63def58d3c189b5d0eb0e0d8596e73e389acf661ec941b3a1fb83535ef39d28236e690a75b88b3f4eaa150ca8085007157ff72b38bf0b508d7090affcf2554416846f32c9295d4f1a", @typed={0x8, 0x6c, @fd=r0}, @typed={0x4, 0x15}, @generic="7852ab1bca45333f28af404eba299aa57b1f55d90d", @generic, @typed={0xc, 0x70, @u64=0x4c241396}, @typed={0x10, 0x53, @str='/dev/vsock\x00'}, @generic="dc01e14e365bb70a930f95c08ba864c282f601f820cf78610b86b98cd73b9f3b4e54b706cda7cca5e017dd7b088b4fbbc82c2bb70ca214a2d0dbc74b3dfae54d29e567c95a81e3a4e9137460e5174d9d133dd6ec643183ba9fad4b4abd1fe8dfc39dfa64"]}, @typed={0x8, 0x5d, @pid=r3}, @generic="6b41e18359197a4f3f8096de54a46ac42090a4c8c9a289d8022b999a4f66a3c986f5903ec8f7f4ab30668c5bc496d91bf5c0b8165e4aeb0dfe8fa6fa19b23434c3928ce981aa2ec3ffb61a69bb163bafcb03ba36bade306cb41bfc3237c90c1a8a716f45e8bed454a0ad90d99581bb77bb8dc76773419ee9bc9003e32382b156af637eab00e41c68c682554516d7109401d35fade9f0cbff19c2aa009d63afe0a9eb34fe63854a043db9176a4eb1d204c216040400e1c45381c7f02301432167af13a7d862d160", @generic="9a659be9f9a08902155f27353c49c93bfee1415da8bfb2d8783b02a0f9ea1d98e67d5a89dcf2dd5ebd5f3b9b1542edf5c3b922bea7cca58885d05fd93e239fa83cfa7bb008d57e1a94106c3ad698a5cb1ca1c85b1390c03208742fa6234a83d04fd79bff2a3df09d064591fdc8f478de21fcf4ac907156a50f3fb0101029fd56636883ce831f42d01723d1bfe3c89365d4e4ab6eb8", @nested={0x1180, 0x10, [@typed={0x8, 0x44, @uid=r4}, @generic="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", @typed={0xa0, 0x7e, @binary="3fac19172493035871b490684029e8f825a1b787c35b52d7d50a65e4934f8f1a613d2a9f391a45cb89958189bac8a755f646b2afae44a802398f3bab5da6c4771f289291c5f9cf2893a40c344f4c581ea3f2727b8c59a6af61b4819efdb144f4ac3465a95037c46aa09c07833b8b081e8d71905be00cc080bdb7f3a438bbbcc496689934e5273b430dbdf136ed8e8f4d64d8b8adf7303b1b7b7b4a"}, @generic="f883e4b44fe3c2f80aa22b3115e780ee76417e1939292998883e2519b80ece9758a24ed09556048d6e19a44a01dc210b8fe662becceeb8f6baec540a11329550df199c5bd9a57ffb960ee2db6c09831640b502662a0e069510e6198e8b3c320638b82870afa923b8a19a80e6c6b62313537c91ed671fbbe3a8b06ebea275673541d71b46798eb60a2623b15a865cf4816c375f77851cd4874b8102015b29f21bb6e7ef01ed4a01b2bbcc72c26db908298bdad0353818ca550cb2ba000a41d5f67bfd41730fab6e8d03", @typed={0x8, 0x3e, @uid=r5}]}]}, 0x142c}, {&(0x7f0000001740)={0x11a4, 0x1b, 0x4, 0x70bd28, 0x25dfdbfd, "", [@generic="0ab36c78e5e81191849b2d3e0f1b140411033826c724086df80b52ca4cc296fb6db201537032ab414e36faf899c07048eed82fae71f984d8783b454fe37216920165c5a95f126c19e82672e4159cc2446d9d359db29caf30118c9953f5908bb12c5ee6f652772c46f44cf9ed9a77b0cadbd5eee672d1b3df9cf6383893713e0d60f151065dfb171ea3e51c9ff1adefcc77029c213c5d61f2e63639de4e29a5c984594737242d59942cc82338f38dcc484dd98c29c68f98da85cfc17fc21c30bafa365bb148efc5ca87ea4c5dabcdae7e664a694b6abeefa09ef8fbd306c064d8d14c", @typed={0xc, 0x6e, @u64=0x1f}, @generic="9663b706e3774d8e7c478b3b0586692b7a0180f43d023e5e8d0da58716e7bcc53d07b583f616b998b5cb76b993a136d70c18b5a15db4a301112c369775353ddf795138b3de91da0459402e00e27c67692dbe1a4011702b771fb62450f29bb338ee5fd0f1a0d46a1450b83dc0b7757e67ab1f94e561705c4c0033b6e2414666e4c9b9ab5f2d75228522b6d5e394e3bc", @generic="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", @typed={0x14, 0x8d, @ipv6=@empty}]}, 0x11a4}, {&(0x7f0000002900)={0x18, 0x3e, 0x1, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x29, @uid=r6}]}, 0x18}, {&(0x7f0000002940)={0x34, 0x2f, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x1b, @pid=r7}, @typed={0x14, 0x5e, @ipv6=@local}, @typed={0x8, 0x36, @pid=r8}]}, 0x34}, {&(0x7f00000029c0)={0x11f4, 0x3a, 0x2, 0x70bd28, 0x25dfdbfc, "", [@typed={0xc, 0x88, @u64=0xfffffffffffffffc}, @nested={0x11d8, 0x3a, [@generic="902f093c7a9775a8801f0439f514474bae780b6a296c56b5a8114bee69ecfb3866fb08dba4ef97e1dd0dbf97c39c4dd7b397cb69f6d85327f75609a57634dc30588f34a764366b98888823c4acd0ed7cbdaacc576a4fc6fb24c4d5f7e8f7ad8aefcf18132306d1540f9bc90f3170f335bd07a7d503792a5a0aab34bb22c14322", @generic="c5c0456bde891a65d6ed3d095d9750473ff6a43911dec36fcb142a6c6fbf6f74f244812f9486f24c71c4727b360a9316185a18b52b79dac7d7cdb74b66f7c877c7a7ca70f00968cfdb3981c0736ce6615e521c02fcf4c7bbe07a083300dbad9327cee003a76bfe6b9ff8d1058368a3c17f6632700da6009572783966492d14e44ed358a6dfd82ef32c521da2c5d40aec0e5ba6b2dc4507f481607cdd48f52f279518611c9e410d065a2ec147b7106a9e20616b6646f5576200f1fe762a85e76de08548ab378190f10ccc0867335eabbe02f0e01371f221a6ecb331167c70d0ce84990f119e4351b15c391bf61c76abf9449a35d00b660f9e8466fcaa9efc22013ce30b7bbfbb51e0c61cc156b8a89c835ea44840cd133c5101bf362819db66e4a0d650623471107df15cdca01850ac3e13ed32bca2b9845f70f0db8de3ce50859723645331406311ed7d802b21fa098a85c3e072ed33a95dea8f75a420a903f9cf860d1eb7d8816daaf3b5d3d429fb019c4573a0b93c62497097b1947f4280c1b351b48c5a3b0d3b65a25ea09928e285d9cb45bb92f63289f5eb9193da6c2e7c3196c0861856f2fa948384d47b04bc26b33c837d310602b5e53ac1d496a50d94bc80132cda19422ecf59914f6f84206b793dd928f307a16fd19cd989f86268e8389a66899390f65b9b00fb7dc4f57c3bf7f1efc4b9b08e3f1b4935535c177f869d333216ad1925a66120b3d35e36c88bf81536337216c5f657fbf9f1ae48dd44e89410e0c8553600fdd2acb3e6c4a7be4ff09d4c86f9460865e80a6690e869bf611abe87cb3d829490e1e4104beb762588104ebe5edd741f34aec1a3b69438cf4acb2ebffc0799804a2898d23b70f142f074bf1ffd7a484c82d4602592439eee451d750827ac89d40de312e89e1359981ccb06df063502e5091dedc498619faa2da43b36c5fac50dc276ab0400c0ce8ccf4e99bc7be011d3749db785b02898e4f493402ae83072a2adb740453d3a668dfbeff020d3dbafb5a608bfdb7d83696e3fd2e4b80022facec2ee3f9f5d024f7744df4c42ce9b8477bb18dd4473f41c1254590d8d06c7b7e86edc91ed64c6b59fe8089a780b057c25986097de5845a3a91040c16db40208d1c35f632c505a06df35c8a881d3eafb23b42fe82924b7932c575e013c8fd7aaa34280df26dd3be1ad5a97eacaeddadb06fb8d8b830c6decb208948b0e7aafbd3b3bf505794b53189774930cfcd238589b3f8151b2ada155921941d6f4900ef73aa85e7579753f82b2dc78d917c1ab0bf9c4e870f6b6ef98f0bc801f381f6a47ef628a480ebea2eb256d0e16286a6e57b09c371acbae04ba9d13dc6c5095fc4ebbc729718baeac29342a6834f9674b79e3395e4bbf88bdfb19deaf7b4b5ce117145704a959036009423a858d76af32abefb95382190c8b7f810e04666598c19519fb3fed58482f1acf4ed7d63f94087c9d232fb12792715b7220fb3575924e334b7e2aaf076279b11ce7ea68b5745672d96d9de85c8fb8433f799b523c11c9459723afacad1ea0f38b1d4623bbed1d17c6ec77d43b3d5cc27ee18cad98e412813c27ae61e9b9d5f8e4c73ec7fe243fa6143734e7b3c22997002c8474d4510839566dec3437775560a582b78d5dedd7165c23b2c50561dfffe4cd9affa454433f9cdba8f8bbe12c1420010a3f7d1593897b9e232dffa3f77236f19ccd133003eea2d8350a553c9f46aa11d2fc69cade49d090284e03ce4d9a6f519f705ba6f01f87c64c46ead2e15617e5e58e81805fc6213145c941baa30a37e676bb527075406d66645883dada184ecfa7c1e146aa9409b7b2c49e80e0130e638e01bf7007ab2a546375ee61f9ff5661101c08514103da543e052d8acce8f0efcba269d76f2434c8ad3c465fde2f871ec5de20d7964100b001f31fa13ab247e42bd42982a50585a37d643802f3fcaa877c05b99d6138199dbf8dba2f5c7f082589ac7c012c106a739b61370ec808ccc9d40547be4d2bed85551558ef0a81b70484f31c34987a58dd02d9a240438d5a7bb865ed7f304a3a2a662c0528cdde1cb58c19b92dd2cfc570a39d7952bb8fe7c9fd989f4c899e2e2329e8b8f7923160ece8c78d77c218f22f05a1c443510076e72bb63107b1eae4703642fcd96bd11298041dadecc74e29ab7a5488e4a6c87745fd9e25c1c825dda58130078794772b2b3bf756dd95665c32283d734aaa143e769888680aeaebe588a023fdab5d13dd06dd5c78ea69565adefd98098d940e22757c41529c835fde884bc748d2de5f3d8c852b77e26cb03c409e593b4fbc0a011eba6a6932ff4228b554a5f7aa5e661ca6bcf29707d1adb7444dc6f033e07966f28e3e20d274067e075cf7f0f0510881681b10171103e54f9c320234f9e2959ffe273fe0394c5f66d0b13e16fe03c26fe629504aff016d72e98b50e5db20b2a65b7c8b3ef8d3e706fa57575fa2e9bcbb6b3dd1e9a885e00c1b57615f0d5837b4177945b5648e1e3ba5f40a03a34336cd11e7cf0b74464ec58d69f12328ee8cd21dd78232417542ed4cd97af78057dcb9131211cf29b06afe12afd76da6ce3f89fe27a5c2342666f684812c0bc1e51965dde7f42e592a71b131cf8bf6df0175f9c3945fdcd8b08a88a0a83f52ac97cbf59831cfb2c7dcf1c643e1cfa122ea2d2ee54d667121777567ee053cda1c63ca6e90207ada70de29978c2b4306f1a9b5c82dc2c443d80aab01f6497a51bc1cd0683195f71590f7a9cf2b44a356ce20d82747463ce8ae520496509052a46fab2a7acad251c2853fd203e435ea400afaad49ebebe2edab381b0a31764680425a29d82f07f98c6b093e5aa15b8f6628aab6859071859037d472666131b0516a8f0f3c380a957a4edee6fb3d7e974b46309db18577d44f3cbe81792cb96e1af1070b415f3691af05113ab391ea52ccb20f3ea5b7abb25d59c8df8d28fb68cf00d82e2b71c6b41d844d1995fb25466f5dc15c00909418fbe0430fe1e874cc6561b1140dfee1424ba427d93603f43023f9750f11f33757907aecb9964773e856369a16596adda4440687d3a88f2b78878430a14107188984c45bc3b238af28ef640487bba5893bafac2e6589fe8e5207e5cb3e46e573e79399efd5311bf38c75352d5e64ac73bd1e545e8e4435aacca1607aad4935353b83c1c8688858892c949f70175305dd83eabf59ef5f57f7667a60bcc01c666e28cc00718746b7994b80b7302c1ea1a18896941c230f986465a934002e0d6377ebcfc6ae45b7ad7c94954f099f83dbd5c2d450aa306b047c9f493aa4ae66beeb758983ec17340ae949f5b66ecba9e388955ae239d5fae58a5b7527388c45a4b67b19aba389be8a0629e9b2938e6de860a08d422f089d4ada97f453ed8431e5801384c0e614260f7debb07ad52f222304078141e5ebcc461ee18f2575241581109fd96a6c7d572abb37396c9d967f29fb47e2af360df581c3a608f1d9fd4a500566135f37b605313de0ff9fb1c1d778b425ae708ab51813ea94af60635c43b212e4de96cac57c4a7184e8042be83d69af10ac61eb5ff4b39b901e3d54394416ca215bf56a5ae5a8d24923963124f2b25e84b8c3a941b38a5af019a090577465de8936e898b374a0ea08d4555e7af9e0b53a710e99b12aec97bc9f90fc528b6fbdc36e0c6cb462e14bfde1a4647cdd6eb777e092c147b98f9a4f719f6cf45b1b6819cc2e559f362b96dbc5053674c5503a30caf8929fc73c2152701a4f4514e5bdb0dd4bc3a83557b9f489fc5e2ee36876301995fb99a61162499dc0b97be6cdd5616049207314c7aeeee16753a195db352d24268402797d702b94fbc89e271441f62826bf18f5694d2807b905e7fb2b92510a3a396db9fa6261da74aec2b40fcf459f9b2921fd8cfc41ca4976bcc7215656eb66697255a8c2f80919a56df056f334d508259d97a4dc8bf422c50fdece5179cd8a5af45973fbda2feed4780a6599f21da899db5da616d02547fff503e722fddd9577dde81e6c8b694f02a7af2e1b38fb39762109b3192b5b0fa8505769f3a883c7fbcb0c5a48c55d9d6480e24b978378521a07ff52db1a07a2cc8b96fca3feade95265389b913f10c63444d83c3c0af7783e494c43d1b7a179bad320eaa79101877c2eadb2f6032f2daac5edcedd00b306ad30a4905a57ff0c8b635e6f6230449a1e1a589e22241519f499464c574fd9c7af428c80a65ade2889368788b4ce38572f5c63cf01427cf53d37cc7c3f1712f14f607c37e513dcafa4d1e6b91650868587f5671c6e8b66406d8c3dd7c12fc158e4c19d11dffc64a7b02596ec9dd6e30b161a1e5b4ae47ccd200f60e43465d9054160269654fb79e0afacf0bf8a4862a75eb2ef483ac53088a443a716cc0193a85bf4275aa35590943840115e3ec89ae7996bd4a5443769b048ec67228a4f9ded21e174dfa36c5b8ec2573341d04f472293cd925942f4bb97fa41f07486dae7459cc60522a466956f402d248d76ad1890296835e4ff70479ecb4643dead169d6d3cdf10f8afd7a793a98834a446bd93754d67bf3edfccf76c00e77ec7882f5f9a395546ef7ae82a4c8db9ea807d21476c66767eaed317752d6d9d1b4438911afcff64b31cc48a3edb24209f43ac59ad0d8bf571de8083d4952a8a9fbc1b779aa7f89bbd160a4ff3bae103677305e556455a5e3e0d3c74f82d46d739d7e2c5fda2240b846c84529d82b51c3bf3353e9f1372fb5b88f82e6f28a364bbbf042ae48bc85b3feb8a050fa7446b64fd6db868fc1ab09cea52ad6f36022896059214d0bf843110b03038592ec027bbb89b58d9f8e17b5470b9d25a3006ccbccc33edf8e0fef173a82a683cba8cfe28137163705e2384e572ae0db59816f05c40c572e78fb1321c4e0f5b7ff0ef23af368630dd9939493959bd0c740c148cd4cb28be0fad7d4dba9a59e66fc3f796e422c53618b2ff71f1d82f8aae5e9066f6268b759985b6b3b94f6575902f018e88c3d53a19972bac16a920f3b7e9a011ef7d44605f5b3d2f85cc35808f60f889fa02ec5f11b9c2513ae03a1f69e8532750bec2dfad0687e7dee5671a9d8163cd60eea61b1d2cff87db85ae0048dab982987b0a482fee73ef32409cd4de13f9891ed20f8bb06b813077ad76f0457c338243252d2e104cbeb7c17ce7b7541f5b981434db761fe6daa38c5a94ad067a3e200cef1d745d1b590712a96b32b30adcf68c471595945693ed39ad6e5af1e1fe3314f515050bcb534bde88c83ea2edd8284e9b085f5980fb86d86086790bc8dd56453985241eff7aad28ddc5199b376347cda41a6fe1a37a0fa6fd8f147d6904e80a6afdad7cb4780594953ec4f9ef8cb5f36dd4a405c3eeec97b9bfad135c76456d36d973a755763ba4c681c8876171d4b6363bd7d5adc2fd6e65992ced8f47765082314cfa4a0e0840b4c8656cf7a23da8cde00a4b147c0695b2fddc480b1f7f12997fc0181c91b2a4a00feddc6cfb59c545d4b755bbe4e5cdb3c37069099e98463949a933a8073e4782fc6aaa27809bf5490b83746baafcc5fef1dfe59bf69470f7fad91943f25e1011ad312fbb967a13422ebd87cf16b4900ad8db5b576e98b69172f9215db1d2d8c3b37d01364d623181ad7d02267bef3531353774a4156f2ee1afd91fdeb20b360899dfa7cbf0980fe1925f1cff7acf1ee1af2049a204201401911350df95edb8d165cccf0a672dfb7cce6d0c9f395d7842a3f45d10dfe9f5b9e0bb33b7f60a3aa7153f9d037f257b", @typed={0x8, 0x1e, @pid=r9}, @typed={0x8, 0x22, @ipv4=@broadcast}, @typed={0x4, 0x92}, @typed={0x80, 0x59, @binary="9001c73655fb278d0c499aa743e8d3985843c8a85bc493c7d77c7debd709a5331293ea6ab1033452d06292989a32995a62f5f9411e82a26652fe4fd05ab828b889fc5289e22c188f61486956821613170518cacee3bf12f60ce93d2ff51d8a5eabfbbf48f42cdeb6ee54e18c6ac51d2265a28e29804fb4f9f935"}, @generic="5eb0bdc9c0de3d6c1de98a56d03d2aa40a57cfbff9823e66cbb59f5ae6ecfc872d56ef7a75078c788914632a269990672a962669e4ccce9b262b57aecd3d7b221082d9385fea18e6408046e135392e84fe193a3c2e3ece6ac02020077a59c55f011785b6888ec68c5a7b6e2d38e3bbeaba4ed6effe63a17a28dcca71f5cd309695c335fe76ff5096", @typed={0x14, 0x86, @ipv6=@remote}, @typed={0x24, 0x54, @binary="5c7beece7e6d6edc8c1a294851332112e07be0d59159cf4a3021e117d9"}]}]}, 0x11f4}, {&(0x7f0000003bc0)={0x1c, 0x39, 0x112, 0x70bd29, 0x25dfdbfd, "", [@typed={0xc, 0x94, @u64=0x120000}]}, 0x1c}, {&(0x7f0000003cc0)={0x129c, 0x35, 0x100, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x11, @uid=r10}, @generic="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", @typed={0x14, 0x7c, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @nested={0x270, 0x54, [@typed={0xc, 0x48, @u64=0xa4b7}, @generic="a0ade8a94b61d9affdd09b7a42456bccf909a96aea6f785546d59e9338ca1f7e124524ab1d3ff6d99fae39283c38db089e70560b7293de5e653861103ce6c8c4ee1c27422fd72b0a51e2fa2dad138b02f2f51bffee6d1a217272c1afa29e468c97c03c3b1bb7e264b5e0e9eaa8a3423d3d2408e824322d90e4ea9c601398e25258ee3582124786c2b44fa6b022a70b12c2b59abff3401bcaf58c49f908d839ffc4c5c71bc44b8dca20e01014ab23b41f638604f14687", @typed={0x14, 0x0, @ipv6=@local}, @typed={0x4, 0x23}, @generic="f0867bb22506b60cd402b319a34ee786076ea6e92cf2ba82f4bcb40cc2e16ceeb131c50a0b78ab4ebcff99dcb29416e8a0d018fcf3f9f7ab86bebfeb35730e7e8dbb8826b34cce6febf8b64b317d0c20c8ec33b52bdb8928d75f9355ab0a473c797cdee57decd94dd6043fc0aaf35b269224d3e149c4f19769ddc71c770c2fefaf4a5eafa7c36fab4b42a5e9126b45d480daf194d42dc0e71b429e19afc4fbad1c781929f80a678d77ea2501223d44f5eecf3c70c22a1d6997f77cfcf3baa398724714e41297a7680a02a5a38da5b2fb1030d3bbdf601218ce010c3eda3b4490a4bc6926a4", @generic="b89a8c1a43220a1c8f64a8e096a09d3f9f7c49cfeebd6b91da589e5254bdbdcb9cf8593ff309140ab8c8f6d6d18e380a9419cc1b43e30dac7c0b7ae0fe1a66fd0a925d8aec028e0f261596a521efcfc07d4a57dde3b61b91d7f98b10c97d837dd5f6f383622d8c0e13757d104b6d31519219313ab921e686f05accf3f079143fd85e3acef4946bfc86ff1a2f8ce96d89d968d35f8789c297a97807b1c605030565457613d3b7c2cf9d98f3"]}]}, 0x129c}], 0x7, &(0x7f0000005900)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00ffffffff00007f2001002000a6a1000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYBLOB='\x00\x00\x00\x00'], 0x150, 0xc000}, 0x4000800) syz_emit_ethernet(0x82, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086090000000000000000fe800000000000000000000000000000ff020000000000000000000000fbff0000000000004c9078e29607149378d33e14b1c73936c77aa3f7fac33b042bd3682368625320948b398414ca0ecb8c4e491934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b"], 0x0) r29 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) ioctl$TIOCGPKT(r29, 0x80045438, &(0x7f0000000240)) shutdown(r1, 0x0) 10:33:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) 10:33:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) munlockall() 10:33:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1063.208101][ T8320] Unknown ioctl -2147199944 10:33:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1063.309188][ T8382] Unknown ioctl -2147199944 10:33:39 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x400) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000440)="ea16d40b9ad630a601fca9d08a9c73bbcfe194cb088c274c1aaf1cbf6c27a8b43d9a0bd1fc8cddb16717bd34b4f53a6c7ace65841da358e0781caa655a91dc04dcfaf6068ca71ed87c5b7b2bff33c92f7ece120d02075f7a43886f8e71a3da185eb5f18493bd75e2aee1f3cab01b97ec49cc2c1cd01ee06a0a598d5705e8e4c0815ecd573ae02aaf4202ae7bac7ea6649a5db92c144226638216c79fcb54a6c52504b7d38d13eb9cabf474480a95501004e9196363439f99c3db698e7a4d1f662dd284219f8ef89dad4828a06dd7accff6779e47870a0a66525aa9a52d59c5ff297b2684e87bfe6b49d4cd009155989a3d39ceece47d76bb8e906ed441598b3633096b88441643b5d4445bdfb9ea43a58f5b5bedc029d765b059959c5508bee4617d38736d2293d2f86cd064427be0cb2ae22bdef4b8b3cb5bffd884329ab31ce18fe03d3fccf1dd0e05ec6a8f2fecfc22232e0c8b9302c38f56815abd62eba0af78a11a50512fdd7eead92aee35c7829d81699a815cd47bba0b09c2ff2857ca60c877fef2cb4c29be7b8e541f56d04d6211c098c2a7511f6cdf49a82243e747f1f5f7cccf25baf83dc6a6400d02e451832bc1ee0afefedc5e7ef791d3a0333eaab7847f85296040200c5af48c4b6e2e0bfb8716bf91761aaedda3d9b96342a7d2147ea1edce072921e86539c2cecf995e28f5d217749c59298a1f00acabe02e8ee95678c1ccd4d3d1f5d2c9750c8fa2d071005660cfc5866a2b2d2eebb8233be3b955c4964634803739fe48cbc815b957adae5241be2b7fd77d45e211b92f272211c9f01f0960e948da5e71924471eca59e9388694ae7be3c1aa4d9a27e86d612f72fc9e2bc3a03c038260cf6301dbb824343a9a7789e4a8d9ba9465296ea041da85266265e0e3b927740bdb83994d199c54c94a14bacc44569e1e9e6fc5aac4859174d40e080ce7ae70a49dceb7365150403f9d32fa0fe80ac5518e3e81a430775af54ac7fe1adbd5148a8ac6b8c7d0bd6d4559e66936a99ae6360dd710bf08dd953c2f6ea40b91c5c58505760c8dc048b4093e31431893fe988308d6993f49d16fb82e50210484e9dd32996fcbbe417a84cb9bc606698af3b844d169473bc7555929fe4586c72cf92cb9b05988819b28100dccfa0ac86dae0df2ca291c73e347d3197cd3f2a7553a57ed738a9546c60f1fead6e96c4ef79b7af9fca1d7aa5f51027d89eac00bb0398fa5dc4e62415326ee5eff2ba22ea5c55d57c14b5147f38bab7b0cb3a4a97b65d00ecc2326114e64887471fda296a3b6bfc72576b56756079038b619328bbca32d37018d2f87dd07766a3e143a30f25fc41c7abc78c22ddb61e544b030d1fe85ad6434eaa6ab7c4701030b180fa9bb9c61447d00335ed4582d4c721ea8f52e5280383b6adbe6e024d711569480aac9866057b943fa7bad2fb5810b99e0d6f50e629953272ba171f5f040680e4df6fc7452ea7c9ca3b669b9c27d2e31ca186a4092f109885c27eb8fd6b52305b731a4f736b84ff483f5a2d3123eeabd6c9ce6f4019a1fa712a25672950490b6a99530072a52a8218d8e355b76abf7a426a96e44c8024ab59c04b16f66687a764336ae631c6e616e72107cf88327b35263a59245b9da0452a6e6c2ce70df96ff7ba2214fb4011a6f1598425b039a7517fc3724499dd8eb7c957fb14f3016cd6485265d56e0c75ef9ea90a75ff4049601b4664484c0938f7c9820e66215fc5cce94d9aba91a128d938af876017d7378fbfbc8d12f983cc8164d4ceb391177612cdafd5bbc711e97f115a07c81a9bb2f5ea178594a2afe16607a5bdbed5f52b3f5a9d8e1ba6fe0c7d4db5c28ccfb4b08562919cc00feddb125647463c70f1c53876873b35076a0c81a4754f580cbf623c71149077a8c4c3e5c82444e66ec50702dd6009b7f771a70b8d66c83b63ac354b1cb3e7f1d39c3c273efcf08ba2712720e0da19d1689997b91f1636a0a9964ae013d602fcb1cccb7e9e00d389cf65011ce1ac153903873f320d69a3ea5e7edb38996c0dc793d378bafa5eba75235da73d156e3c29f339a7ac316e4d0b3bcba019d60355fdd0ccd05b13b4db795bee32038305a3b91dc91ded0c49bbc91ed22b00178104f8ba7d635b3b4d96d0e75ef611b929f7f90f6cdb37d7d93448b61d78093a8979078f372abc778e2b7f2ebe7cf699f93c81d66a5ba9f32a8274dc2a402f4d7985e8f2ea4db7e70579339d00663180fd4a63d557bdde48448cc9113713b0c8c96c64388b20ba4012779dca2129ab461eadf77c2358038c82f73f3e7e7ea60f4cb1efe18ca419c5a4862840692d1a2a8b7a2c207a660662a4988db2745443c2667f230079321c7c9ecf330cfbc6a5532e26766836cc13bef92e05adbd10d8e5b01b5653a581b15d32d0cd3aa78a45d1ec6c806dbd559093ddb471e0e3d7eaa7ac5388aa18e5016d7d854371c273044c41ea86c3b6e3b77d1b8363abd724583edc2afe57be0e475c7975a3d6174122ba39950038cb2455b5bf72460a8faf76d42b6e91d69d23a48fd3ed284923f4c05c9f5ee8130426c96582042bbf771e973dfe41888b0e62252c0191a4d3a2f62a7de734178a1bc486676f65900ad48f26ed0e1044e7a2d922b316f71ee08749e15f9e843375220a321548db91387c1713c2cbb250a75e8a60a84941cd356abed9439d6857eeed0af1ce883155ddf1ef8facc74c891afb8dbd4ea9e1087f78adcbcafd9c868d0cfbd692cbf6dbf36f3738bae4a6cf3a2b1b943802e09ccab4c0ee39ef6713c7fbb00f17266e33796ff3a7f8b9de401daae5948d846857e30704b8c5c07dbb2241d10418a31d2ed9bca387db4f3d9c538e3581b751a453c8adf3050554162d8696f01bb0ff63d422b150da8fc80128d3b0861eb46f3596a4b2ccc5e4115561cb7e4a5513dcde28f4ea3dcbc4b19d2fb5e3603a7d41fb5f1af27ba19de0b75e51a8fb6f6ee7cbaf76ffa20dab81e0ef95ed76ffd3fd404def01e54950e5071fb0c3dab1fbe85eae3c5990846ad8a5136ba0de82c140c7094fb572b10dff4d88ba03077d8a2bbd1ef775990c53c8865b423ca5f2f648bbce564323708cf72b22e1d8dad501da72f240922876943761d412aec73ce90a69c0fc1c1a7d5668db23f2932fa8172f421f1b495bd03beade48a06b1476b39d4eaf9da68a1e3372e6ffbb84b0483925111bcc374bc61e44e37e35545e4da2e7d62a29a062f6b502c5a5d220a2f37be5565111d985d9b521aa69d207474d4e81cd9d7cadf722c7fc496fe629411afc69e1157a7c9d7472379aff79b080b7d2981f50eb67ef8a0cae3860e5989add5501a5a7363e4aba7ec7df0e1c60f057e8e38ba1c7b7215d47418218bbb9432cbf46444adc9f77b974be77ddbcd4676984e911a8d13119ec24c9c1b91892694305c56b87806e4db0af4e88d8961c28337e1bcf91c0eea016f487e0117606c20c615cd9c5a2e66a117e9c3b13c4bafa8decf8f953798a738714186bd7f71de0dc85c49ba23d1430dd4909b883817df3d7f258fc7789da239e6da442cd36aa5ce3fee4f22ca08c3636e680fc00fa4841fef21a2e9094790216c3bbcb718b312af01998c2c99960d81ddb5cd100d1eeb4dbf55b822106d1c8bec81d34726482175f74bdb5460d6f54efdba63c6619ccbdce9e65c0c41d7e346235eff3bc414bb4985af0c7f90d8eefcad94a4b8cef1b1a522efa556e542944500f94f565a50d7ba1574bb8ad531792b125486a55c841d7f79cf4dce9fda8655ccbca20425c072a7b45631205920efcde9ec1f8769d79cce78501248679fc10ea9067adda81928b961b49cb459063fb4b98d47675feed06950aa2a9c8c7872fbaf686bbecd69e6cf6764ba635ac0a0edd60ba2cd777d59fa11c4dcdeb57b0c53ddd9692738688fa7d02b076f4ed23e67667f4ff8409dc9c532bb9b34870c3fdc22d11a2ded8d51e43d9640d6e22bdf0964e2590dd1f526d14fb8359bfe6b3de2f85b77fc4930096cb0a387b9d6b61a204a8a766d4dd79f9cafcc36c52ed978e8862c1a5f8eac914f6f3af818cfc684453a7196e2811a0995780311af1997085a5cc9ff01eac910e9538854b6647d903fa71b9fec76ded5bca2224e9345a4a3a5aad6eb7507e095cd4617d0a56659a1cd79365ca9af3dcbefc1465b4fe6d8198098cd722de0f385622e82aa85bc4c4b68eb26f76ca3a71ea747aa6eb92fdb2c0438d1aec322e4219c5db4fed85673f41a4786e6478c03d07f1e087f37866c6f733a62273456ae119a56688d44e5aa460758c656f298faebc7999d24136e28d3adafd4705768bcbe9feaf047f552fdad47b5f68246799d3630a3cd2b886f8954504afb9fd87fbff2ef2d8962596d3179128393e3a004186d8882407af05788e000fa8eb749d7e3a5cf7afefef0ddf23cd74085fc2a0412cc80611223f1506fe7e080e738af9593c91b2f043fab452718d61019ea0c10c606d04f1baa652381098cb17a62c634a844ccf87d86bf6a4af3a1600ead5d01d3cd8fa39214227d59afd52c686220be5a87518eddb5ec18c5c4c7253d76311f9298a851c3e98fc850814c523a7d51bd7b61342bf32543faa8f64e68bf770b574063ab5b9b838ea2dcc9b0d6e98b1c07febb84d54f28d868763a495f59e9911be37c89ea68b0e4d4a6b8ff0dc3940f0bc1b44d7c36517d29aded9d3af74bc04639161f3a058cd46dd5e94cb021b54fa0505c9d956e20765910773a6bedc91755c9ba14b3fa6827d4699556ebecbb1c1893b04db389afb9c285f046704a86f7e791b8e88b062375fd1dce6fa85ab3d9b755f6fa26b1e9162d3f695cc2d9e51a94cc7508c354902e16730a11318816233c2a32c773c6c5812b4da1440727e7a09dc434f4892f42a588e32389dd8a5e2bf9a3233ccaabaae3f9019eda56b35af33ac7efff54a08ccf7321201191243f50fa308bec30b68a5dfd68802857f216f430933803666a967af8ae5e911544348efbfd0da9b33c40f9e854aa42e723832a49c3de8cdb308f0fa081f6c316c177da8491559b1c84fe7d31101f9426052047b62a68fbe7eaef715855a2166ed9ba6eb467c563d438dde35861f020c3a669315380df6a960495b6e2b883b1ac83221fb56754008d414f4dd21a60fe1d42ef5416f45b49dad7ad1dd2a633a02af091efa4962193d8d30b86739a5584563aa12d76ed86aab7424a589f819fb45862b254ca97aba28235bdfd6f8f959da525381a3ba9b2b517fec71d1a0b4eabd2ce71bf944393bfe3782010a7c5ba640fd9a4524ec633845eeead0b53d0f21fc18f52e09703d31f03844bc1e69c07303b7b2050270100db07eb2baddf06e541a2bab85bac75602080ed19f0b5fc4fbeafc2914652b97ca14bd75ece438829d6ab59544184d1256d5a812ca7d575492c009d02876d1d49b75ef604c6cdb26c71de9366edb3176e84ff1d3eea2a5e940ad5d5e511af1813110f67c780c02212d71a5eb271300f15b4b9ceed0e2d1cf1e30b96243e0321e13e793e3623f48b197eb1b141fb15cb41d7802c44d6bbb0336e9776b0e818bab56ba965b7796c5cd715a60b8a518dc37b2c08e7c8936916bbfba2118a082e74ac6facea6d825704d6718a603140bdfbe7664eb7a899a30a51cef659b659415d2c2ec616fe1d2e762562cec3b35ba835b05a4637f4ca4acd3dc4f9a699f7ad1c0c966393b26244f0bd38b8419e5c8a59d88491cd7c46fb805afc698a6b561fe169f95fc392a2d3d9762d48fdfe9af975f6374ce6cb5", &(0x7f0000000100)=""/38}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) 10:33:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0xf4240}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 10:33:39 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x2, 0x10004, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x3, 0x4) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000000)) ftruncate(r4, 0x10004) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0xfff, 0x7ff, 0x5}) sendfile(r2, r4, 0x0, 0x72439a6b) splice(r2, &(0x7f0000000140), r2, &(0x7f0000000180), 0x2, 0x9) 10:33:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1063.574382][ T8448] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1063.654852][ T8448] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) [ 1063.738078][ T8448] Error parsing options; rc = [-22] 10:33:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x26, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7b0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x5668efd23516df2) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9c0, 0x4000000070000) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000440)=r6) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@empty, 0x4e25, 0x3, 0xffff, 0x7f, 0x2}}, 0x44) r7 = memfd_create(&(0x7f00000002c0)='+\x8bRN\xb4\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00', 0x1) write$binfmt_misc(r5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="be363dd784f858ae6c2dce54169c88e48aa1af06e1e51defa2e4938e43d07e5d344d7d09cd2d7e3cf58fd2fbb6c604625a50e1a9cc50ee6de2d636dff78ab085d3cc59adedd5d33e05130d94b737ffa893adbc1c8367d0d896f2ee3f9dd23275bbb9d54e67f495dcefc539cf3ac4eb03ecae6983cfa1f8940a237e20d5779d5b04"], 0x81) close(r2) r8 = dup3(r0, r7, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYRES16=r9, @ANYRES64=r0], 0x1b0}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0xfdea}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) sendmsg$key(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYPTR], 0x8}}, 0x0) sendmsg$key(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x8000000000) 10:33:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:39 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000100)={0x0, 0x3, 0x1, 0x0, 0x3}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$peek(0x2, r0, &(0x7f0000000040)) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) 10:33:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1064.118402][ T8572] bridge0: port 3(gretap0) entered blocking state [ 1064.145269][ T8572] bridge0: port 3(gretap0) entered disabled state 10:33:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1064.209688][ T8582] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1064.256332][ T8572] device gretap0 entered promiscuous mode [ 1064.295303][ T8582] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1064.313101][ T8572] bridge0: port 3(gretap0) entered blocking state [ 1064.319786][ T8572] bridge0: port 3(gretap0) entered forwarding state [ 1064.345288][ T8582] Error parsing options; rc = [-22] 10:33:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}) 10:33:40 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000240)={0x0, 0x2, 0x10004, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x3, 0x4) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000000)) ftruncate(r4, 0x10004) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0xfff, 0x7ff, 0x5}) sendfile(r2, r4, 0x0, 0x72439a6b) splice(r2, &(0x7f0000000140), r2, &(0x7f0000000180), 0x2, 0x9) 10:33:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x26, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7b0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x5668efd23516df2) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9c0, 0x4000000070000) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000440)=r6) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@empty, 0x4e25, 0x3, 0xffff, 0x7f, 0x2}}, 0x44) r7 = memfd_create(&(0x7f00000002c0)='+\x8bRN\xb4\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00', 0x1) write$binfmt_misc(r5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="be363dd784f858ae6c2dce54169c88e48aa1af06e1e51defa2e4938e43d07e5d344d7d09cd2d7e3cf58fd2fbb6c604625a50e1a9cc50ee6de2d636dff78ab085d3cc59adedd5d33e05130d94b737ffa893adbc1c8367d0d896f2ee3f9dd23275bbb9d54e67f495dcefc539cf3ac4eb03ecae6983cfa1f8940a237e20d5779d5b04"], 0x81) close(r2) r8 = dup3(r0, r7, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYRES16=r9, @ANYRES64=r0], 0x1b0}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0xfdea}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) sendmsg$key(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYPTR], 0x8}}, 0x0) sendmsg$key(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x8000000000) 10:33:40 executing program 3: unshare(0x40000) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x2c42, 0x0) 10:33:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}) [ 1064.850242][ T8716] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x26, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7b0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x5668efd23516df2) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9c0, 0x4000000070000) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000440)=r6) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@empty, 0x4e25, 0x3, 0xffff, 0x7f, 0x2}}, 0x44) r7 = memfd_create(&(0x7f00000002c0)='+\x8bRN\xb4\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00', 0x1) write$binfmt_misc(r5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="be363dd784f858ae6c2dce54169c88e48aa1af06e1e51defa2e4938e43d07e5d344d7d09cd2d7e3cf58fd2fbb6c604625a50e1a9cc50ee6de2d636dff78ab085d3cc59adedd5d33e05130d94b737ffa893adbc1c8367d0d896f2ee3f9dd23275bbb9d54e67f495dcefc539cf3ac4eb03ecae6983cfa1f8940a237e20d5779d5b04"], 0x81) close(r2) r8 = dup3(r0, r7, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYRES16=r9, @ANYRES64=r0], 0x1b0}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0xfdea}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) sendmsg$key(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYPTR], 0x8}}, 0x0) sendmsg$key(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x8000000000) 10:33:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1064.922865][ T8716] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1064.996118][ T8716] Error parsing options; rc = [-22] 10:33:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}) 10:33:41 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x81}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x8, 0x3ff, 0x2, 0x8001, 0x8, 0x10001, 0x7ff, 0x1, r2}, &(0x7f00000001c0)=0x20) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xe0P\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x26, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7b0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x5668efd23516df2) socket$inet6(0xa, 0x2, 0x4b2e) ioctl(r1, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r4 = socket(0xa, 0x3, 0x8) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9c0, 0x4000000070000) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000440)=r6) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x0, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@empty, 0x4e25, 0x3, 0xffff, 0x7f, 0x2}}, 0x44) r7 = memfd_create(&(0x7f00000002c0)='+\x8bRN\xb4\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00', 0x1) write$binfmt_misc(r5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="be363dd784f858ae6c2dce54169c88e48aa1af06e1e51defa2e4938e43d07e5d344d7d09cd2d7e3cf58fd2fbb6c604625a50e1a9cc50ee6de2d636dff78ab085d3cc59adedd5d33e05130d94b737ffa893adbc1c8367d0d896f2ee3f9dd23275bbb9d54e67f495dcefc539cf3ac4eb03ecae6983cfa1f8940a237e20d5779d5b04"], 0x81) close(r2) r8 = dup3(r0, r7, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYRES16=r9, @ANYRES64=r0], 0x1b0}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0xfdea}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) sendmsg$key(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYPTR], 0x8}}, 0x0) sendmsg$key(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1a1}}, 0x8000000000) 10:33:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x600800, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000080)='$\x00', &(0x7f00000000c0)='posix_acl_access\x00', 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000140)={0x0, 0x0, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={r3, 0x80000, r1}) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipmr_delroute={0x3c, 0x19, 0x300, 0x70bd2b, 0x25dfdbff, {0x80, 0xa0, 0x10, 0x7ff, 0xff, 0x5, 0xfd, 0xa}, [@RTA_DST={0x8, 0x1, @remote}, @RTA_ENCAP_TYPE={0x8}, @RTA_PRIORITY={0x8, 0x6, 0x100}, @RTA_GATEWAY={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) r5 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x3, 0x2000) ioctl$KIOCSOUND(r2, 0x4b2f, 0x8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) sendfile(r2, r5, 0x0, 0x8) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000300)={&(0x7f0000ff9000/0x4000)=nil, 0x1e5, 0x2, 0x54, &(0x7f0000ffa000/0x4000)=nil, 0x3f}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x7ff}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f00000003c0)={r6, 0xffffffff, 0xe1, "e31ecd757ce7897ca3eb31f456f39b69bf6920aea2cef7d386224262c5f8233107d33aa11dbf1d98c1f05d9a897fb7350b0b15afb1e2f2762fe2ea3d9eaceb9084d9efaa4c0c8d2d85caaa6bf68db73ab8249fefeb7ae6d5c8da229dce66976a56dec4cba8eac4bc53886863cf97b77b9490c70994abda01bec0688203ca6cd96b6e8576b33ba4d7fe9608e63c5b5df766de33357850c7cb55ef671ee1b83a7273934b1bc6b4192e58cc9cb76b72c992ec1ab816a001e773133ad600232c37c47a3267c5dedb14d9747f7ee6d3983ef1bfcf183c4320436875ba613fc5d2ddbd6a"}, 0xe9) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f00000004c0)=0x0) sched_getparam(r7, &(0x7f0000000500)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000640)={&(0x7f0000000540)=[0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x7, 0x9, 0x8}) write$P9_RREADLINK(r1, &(0x7f0000000680)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) kcmp$KCMP_EPOLL_TFD(r7, r7, 0x7, r4, &(0x7f00000006c0)={r1, r2, 0x6}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000700)={r6, 0x8, 0x3e, "e9db9c199b4ca62c20238cdadc34289be1023722ed7121f17a9d0dd7409d1ad0efe01ee27a3033d991a0ddc701d788620682c1e75f827669fb5b16b9b79f"}, 0x46) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000780)=""/245) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000880)=0x6) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000a40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000d40)={'rose0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000002640)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000002740)=0xe8) getpeername$packet(r1, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000027c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000002900)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000002a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002e00)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002f00)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000002f40)={@local, @multicast1, 0x0}, &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002fc0)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000030c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000003100)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003200)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000003240)={0x0}, &(0x7f0000003280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000032c0)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003400)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@initdev}}, &(0x7f0000003500)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000084c0)={0x0, @local}, &(0x7f0000008500)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f000000b040)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000b080)={'bridge_slave_1\x00', 0x0}) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f000000b0c0)={@rand_addr, @initdev, 0x0}, &(0x7f000000b100)=0xc) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f000000b140)={'gretap0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000b180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f000000b8c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f000000b880)={&(0x7f000000b1c0)={0x69c, r8, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r9}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x9, 0x100, 0xff, 0x401}, {0x1000, 0x1f, 0x2, 0x8001}, {0x75f3, 0x8, 0x8, 0x8000}, {0x3, 0x80000001, 0x66a, 0x9}, {0xfffffffffffffffa, 0xe5f0, 0x8083, 0x6}, {0x40, 0x1, 0x7, 0x3f}, {0x81, 0x6e, 0x8001, 0xec0}]}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x1f0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7c0}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8, 0x7, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r21}, {0x1d8, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0xab2, 0x40, 0xffff, 0x400}, {0x5, 0x3, 0x9, 0x3}, {0x0, 0x0, 0x5, 0x1f}, {0x5, 0x8001, 0x8001, 0x6}]}}}]}}, {{0x8, 0x1, r25}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x1}, 0x804) 10:33:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}}) [ 1065.589617][ T8868] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00q`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1065.646637][ T8868] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}) [ 1065.770161][ T8868] Error parsing options; rc = [-22] 10:33:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0xc, 0x3, &(0x7f0000000040)=@framed={{0x2b}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:33:41 executing program 2: r0 = socket$inet(0xa, 0x40000000000007fd, 0xc0) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xffffff41) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x4000, 0x370) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000c2b4de"], 0x10) 10:33:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xd0p\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:41 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x7, &(0x7f0000000040)={0x0, 0x40, 0x0, @tid=r0}, &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00`q\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440)='tmpfs\x00\x17\xeb\xc6z\nRn\xcdo\x14\xad_\xc6\xa8\x00\xe3|p\xb9\x86o\r\xb0\xef\t\xe4\x1ayFZxO\x8b\x0e\xe4\x11\xc0\x9f\xd8m!j,\xd5\xa7\xa0:\rX\f\xfc\x86\x89\xf1\x8d\x83\x85_\xb7\xe7\x03\xcf\xb1\x882\xd3\xfc\xc0njA\xe9\t\x8b\x1b\xd7\xf8\xb2\xaaJI\x83\x96\x12\xa6TWf\x01n\xfdX\xf2\xc8\xe21\xeb\xee\xa4R\xa9\x89\xc3\xaa|\x12\x85}\n\xf8\xc2&\xbaQ$\xd8d&\x7f\x90b\xcf\x99VW\xae\xb7\xb6Y\x00\xcb\xf4i\x7f,\\/\x8d\f\x9c)a\xe4\xc5\xab\x9f0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(r0, 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000080)={0x10}) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r2, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) 10:33:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}}) 10:33:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:42 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x800, 0x90000) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 10:33:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xf0\x89\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x7) r2 = shmget(0x0, 0x2000, 0x4, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(r2, 0xe, 0x0) fallocate(r1, 0x72, 0x0, 0x81) [ 1066.741382][ T9160] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00p\xd0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x89\xf0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1066.778866][ T9160] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1066.842976][ T9160] Error parsing options; rc = [-22] 10:33:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}) 10:33:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00P\xe0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:42 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x5, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1067.313573][ T9293] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1067.330786][ T9293] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1067.344440][ T9293] Error parsing options; rc = [-22] 10:33:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") shutdown(r0, 0x1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4802, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80000000002, 0x4) recvmmsg(r0, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) 10:33:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}) 10:33:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x2}, 0x1c) r2 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x0, 0x4081) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x5, 0x3, 0x7, 0x6, 0x498c, 0xfff, 0xffff, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x2, 0x7, 0x9, 0x0, 0x63}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r3, 0x81, 0x10000, 0x6f5}, &(0x7f0000000400)=0x10) listen(r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x4, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 10:33:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:43 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x9) sendmsg$nl_generic(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="c8000000120001002abd7000fbdbdf250a000000fbc1f8403b646f159d7fbc068ac882d53848d62ff2de16c080931ee3398097e807cfcf821e7d01daccbc84ddfc3fea302346140b0fe67e7003cba0636b4a50654ca1386e0b5fe82c2914b734541f370705225a4de9a7aa93b19ce8e99a08727c18efdb46ad96f752409ab17c61397b1b429e93bc86b7939a3f836d85c08c2af3129c5eda35da82bf29d90a409228771347b5cc5d257747f9d02b09df11c4a48f8631187408d2ab43cdc668700400640000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x1}, 0x41) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000440)="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", 0x1000, 0x1, &(0x7f0000001440)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) 10:33:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}) 10:33:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1067.574979][ T9411] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1067.618488][ T9411] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1067.655810][ T9411] Error parsing options; rc = [-22] 10:33:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:43 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 10:33:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}) 10:33:43 executing program 3: unshare(0x40600) clone(0xffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4200, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f00000001c0)=""/173, &(0x7f0000000280)=0xad) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x3ff, 0xf2e3, 0xc3a}, 0x10) fgetxattr(r1, &(0x7f0000000180)=@random={'btrfs.', '-*\x00'}, &(0x7f0000000440)=""/4096, 0x1000) [ 1068.281442][T32681] libceph: connect [d::]:6789 error -101 [ 1068.287632][T32681] libceph: mon0 [d::]:6789 connect error [ 1068.298377][T32681] libceph: connect [d::]:6789 error -101 [ 1068.304368][T32681] libceph: mon0 [d::]:6789 connect error 10:33:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) read(r2, &(0x7f0000000080)=""/169, 0xfc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r3, r2) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) shutdown(r4, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) tkill(r1, 0x15) 10:33:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}) 10:33:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:44 executing program 3: unshare(0x40600) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xda, 0x40) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6a8, 0x208, 0x368, 0x4a8, 0x0, 0x368, 0x5d8, 0x5d8, 0x5d8, 0x5d8, 0x5d8, 0x6, &(0x7f0000000140), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, [0xffffff00, 0xffffff00, 0xffffffff], [0xff, 0xffffff00, 0xff, 0xff0000ff], 'bcsh0\x00', 'vxcan1\x00', {0xff}, {0xff}, 0x3f, 0x5, 0x4, 0x48}, 0x0, 0xc8, 0xf0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x4, 0x40}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x1f}}}, {{@ipv6={@mcast1, @remote, [0x0, 0xff000000, 0xff, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffff00], 'bond_slave_1\x00', 'bcsf0\x00', {}, {}, 0x7f, 0x3, 0x7}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x2, 0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4=@empty, 0x12, 0x1, 0x827}}}, {{@ipv6={@rand_addr="1c2f80cffc9e163dad5620cdb4738ccf", @mcast2, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], [0x0, 0x0, 0x0, 0xff000000], 'team_slave_0\x00', 'bond0\x00', {0xff}, {}, 0xbf, 0x9, 0x7, 0x40}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d6, 0x9, 0xb152, 0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@mcast2, 0xb, 0x3c, 0x100000000}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xbf, 0x0, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x29}}, 0x4e22}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x708) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) dup(r2) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000b80)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY.\xd5\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5\x11\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl\x00'/223) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000200)={0x0, 0x1, 0x8, [], &(0x7f00000001c0)}) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}) 10:33:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1068.850535][T32688] libceph: connect [d::]:6789 error -101 [ 1068.864617][T32688] libceph: mon0 [d::]:6789 connect error 10:33:44 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 10:33:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:44 executing program 3: unshare(0x40600) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x107, 0x4, 0x3, "dec5a0b7b4d4475dfaae947d922cfdb1", "8c64357696b6878acb99b92a2daec9ab2b6c2b6ea90f719e518c230feedb047f2d941e52683c2cdf0811fa4b05d3da554e69f05b520fb2ac3b344b153a41413c6f4e91f871e0b1b2bc9d1c58a3cd56282786329320c522abd1d125df40cc4b74cf1cf6af7a11cfbe4e436a602fd92cc933e9d48ac4d5d86890c2049c4a2f44e4378a0ae8da0aae2ac51d5d8872942b0b4ecc3c4682e37dad9ef781f9c5422381399dfe8a85fd48244b52d6616492f1b7f43fdc62b9accde29eb29670f654180fb8c4540162e905e31c7c100f21e40df972a049dd7ecd9275c031113afb3555c244ed32a8d354115a728a35e7e4f1948efc8c"}, 0x107, 0x2) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000240)={0x3b, @multicast2, 0x4e22, 0x0, 'none\x00', 0xa, 0x7, 0x54}, 0x2c) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xa0000, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000100)=""/177, &(0x7f00000001c0)=0xb1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$binder(&(0x7f0000001580)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000001500)=0xe8) getresuid(&(0x7f0000001540), &(0x7f0000001900), &(0x7f0000001940)=0x0) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x6, &(0x7f0000001740)=[{&(0x7f0000000280)="5a531ab60851035fc0fcf4569376dd5ff82c1ebadba3706e119b8aff2e13ca9389a80b3fa39de60adee963002114357bf3f67a0738658b68d24b5aafb88b42318014d57f6d23dae71aad6556b98ac5161979a7863400d31568ca770ff48c3a649c4b0271bd15fc1ee415045e404c27ac754f766e", 0x74, 0xf08}, {&(0x7f0000000300)="95bc10215610c026c3d37ae8efa4d142193e9f820cf1047cd3a600f143ea5175951053aa30385a292883ce4dc06b7e24271219095c14c8faf7020ad6004a0b77733a56e6a4cb839ff261b83115326175ef0da3578e5aeb449589c93728b007a0294a1f983435b6813ecb957d21ba08fc6799e211a571d78b48f44f8a9438221f", 0x80, 0xff}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f00000003c0)="41dde0c5853c2b6869d40a423c777cb447faea99028da29721e47eb5b4d56ba9499eb95398bc7fd3979fa4d3780197ceb38c504ffa1356f9185cdb271e6f0e3137024ec1fff67337480024db3bc4c52051faee82fad7182835302c4838f7ec5dd7cace25eda14c0825ae58729658819b01b17b0cbaa2bca2f730e951415bc833b64173fe3d9b855a03", 0x89}, {&(0x7f00000015c0)="6f07f31bac5fa742c1d266ee3aba3c5d298d9493b51fe212c0f6b89761b7a245047dc81df78f7a2abc792e0d89fdd99ab0c921bc81cffbc4556186093321f531c0758d9aff49aa92d215d7ebed7b2ff918a53cbbdd8a5e1c16d8e9d92394aca5d5131b697f55e8258a563c93ee572a1158294d6deaa83e8bcac4717de5a0cd72ee5d66090670a71c45be7528a0f812a1ff0be02554ac04d0b21392a3722c83772e67718331825a43771a", 0xaa, 0x1}, {&(0x7f0000001680)="cd750a6348ae99a7f0c884bd293e015088091232e83671fa61c91c971b410793876f2581b0a63649f04319329bf3d2cea84d692b5453402c4bb4478cefe452c7e8d79c9ae954bbdcf0f24219a3edcf3cfd4dc90486d03fe569305cd17ad2ce77b636882391f07e26cf1f59375479b92a2da70c4530ba54c1618d043225184b8c4b3d4cc31db553313eef", 0x8a}], 0x812000, &(0x7f0000001980)={[{@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0xe00}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fowner_gt={'fowner>', r2}}, {@uid_eq={'uid', 0x3d, r3}}]}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)=']md5sumppp1\x00', 0x2) fsetxattr$security_smack_entry(r6, &(0x7f0000000240)='security.SMACK64IPIN\x00', &(0x7f0000000380)='/delo\xff\a\x00', 0x8, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000001b40)={@in={0x2, 0x4e23, @empty}, {&(0x7f0000001a00)=""/221, 0xdd}, &(0x7f0000001b00), 0x53}, 0xa0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x307}, "bac5dcd70bcd0351", "e11d66c401ccafcc34a6467488887e9fa4c6a65e9b4bcd7107313d48a9ab3952", "e2ea6dfc", "03a06b0fded69bda"}, 0x38) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) getuid() r8 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000001c00), &(0x7f0000001c40)=0x4) pwritev(r8, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r5, r7, 0x0, 0x2000006) 10:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}) 10:33:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1069.055918][ T9795] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1069.098732][ T9795] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}}) [ 1069.251245][ T9795] Error parsing options; rc = [-22] 10:33:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x460803, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) socket$nl_crypto(0x10, 0x3, 0x15) write$sndseq(r0, &(0x7f0000000040)=[{0x93, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 10:33:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:45 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x73, 0x0, @initdev, @local}, @igmp}}}}, 0x0) r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="a5e88e4fb16ec6a0d7cdfd072027aa15f4e444e9dc5df33db802c289368a1bd8b47d3dc742c299c5015917079566ecd4d2f9959f4037e85c98a865a6ae6287954cb8c52e60fd54fac7f25320b88b6fb04bd67099c03bd7d452cabd1d34e6b9a91833a77e6921a0036483d8642dea25960a5bd4442cb12a8333a787024252d48ac64ffc338ed313d9710e6b723dbd41421607546ac58ec46f3819f65813c07015e745816871e23cf7c4aa91870ffafe47cab9f121", 0xb4, 0xfffffffffffffff8) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000180)) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000200)={0x1, 0x0, {0x52c3, 0x100, 0x2015, 0x1, 0xc, 0x8, 0x2, 0x6}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000012c0)={r0, 0x3e, 0x1000}, &(0x7f00000013c0)={'enc=', 'oae\x1f\x00\x00\x00\x00\x00\x00\x00\xeb\x19\xc1\x01\xb8\x18+\x8f\xcb\x02I\xc9h\xc8\xb6q\xcf\xdd5\x03\xa3X\xae\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00UYFYW\x8f\xe3\xa5\xd5\xd8\x96\x90\xa97\xc4psN\x11UL\xcdv_\x9c\xdb\xe7\x02\xf3\xce\n\x98k(\xdfR\xc2_\xca\xf6^0x0) tkill(r0, 0x26) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r2) 10:33:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}}) 10:33:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x0f', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:45 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x82000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40810}, 0x20000000) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000001c0)="2400000043001f0014f9f407000904000a0007fa10000100400300000800000000000000", 0x24) 10:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}}) 10:33:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1070.175063][ T9946] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:46 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000000)=0x9, 0x51) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0xf980000, 0x5, 0x7, [], &(0x7f0000000080)={0x9e0902, 0x4, [], @string=&(0x7f0000000040)=0x85}}) write$cgroup_int(r0, &(0x7f0000000240), 0x12) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x5, 0x44d6d6ed, 0x20a, 0xada, 0x9, 0x2, 0x200, 0x75, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @loopback}}}, 0x84) 10:33:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00?', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1070.256420][ T9946] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1070.321219][ T9946] Error parsing options; rc = [-22] 10:33:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x8) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x8, 0x401, [{0x9, 0x0, 0x5}, {0x81, 0x0, 0x1}, {0x6a1, 0x0, 0x8}, {0xfff, 0x0, 0x10001}, {0x0, 0x0, 0x1}, {0x2, 0x0, 0x3}, {0x8, 0x0, 0x846f}, {0x50, 0x0, 0x369}]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r2) sendto$x25(r1, &(0x7f00000003c0)="eb4c9e15c73c531153331f5d5dd3eaf590a4728b3aefd621617fa5dd194798afea9c2f37af0b71a163f042ea7c8046d9c92dfdd7fa47fdc8695bec3d26645bfb44ded1da7dd46388a9b9895f2c09d8062d9e5750bf926503cf3b3447ee0a7f49ee68a71e36a47379ecebffc61142cc350fbf498084ebfdecb6b89e999503a3e0374fc4877186d2aa74b41cfb4055b0b518131e68a8094772fcc1b9399eab84f30b51ec92e5bbbb3282e44800ba56eb6a8f91bec49270ee5d8a8e2e90cb75819f8d04a48cd18796b9e3eaaaf94e9e47e27d149ef63ab9d9c5e83c31", 0xdb, 0x40000, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) dup3(r2, r0, 0x0) 10:33:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:46 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x1004000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}) 10:33:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) fstat(r0, &(0x7f0000000240)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) socket(0x9, 0x7, 0xfffffffffffffffa) r2 = fcntl$getown(r0, 0x9) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000200)=[0x3ff, 0x8]) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x414000, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x7, 0x5, 0x9, 0x3, 0x0, 0x9, 0x1000, 0x2, 0x3, 0x7, 0x2, 0x7ff, 0xfffffffffffffffa, 0x5, 0x0, 0x2, 0x0, 0x5, 0x894f, 0x3, 0x1, 0x3, 0x9, 0x9, 0x7ff, 0x4, 0xd03, 0x6, 0x1000, 0x2, 0x4, 0x81, 0x7, 0x8a, 0x800, 0x3, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x20200, 0x6, 0x1f, 0x7, 0x7fff, 0x6, 0xf86d}, r2, 0x0, r0, 0x2) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0x20, 0xfffffffffffffff9, 0x9, 0xfefe}, {0x100000001, 0x6, 0x1000000007, 0x5}, {0x7f, 0x5, 0x5000000000000000, 0xfffffffffffffffd}, {0x10000, 0x0, 0x7, 0x8c}, {0x20, 0x7, 0x3, 0x9}, {0x5, 0x9, 0x7fffffff, 0xfffffffffffffffb}, {0x11, 0xfffffffffffffffd, 0x0, 0x4}, {0x1, 0x7, 0xff, 0x1}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000440)=""/233) 10:33:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}}) 10:33:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x28000, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00000000c0)=""/121, &(0x7f0000000140)=0x79) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000680)={0x0, 0x0, 0x10001, [], &(0x7f0000000640)=0x1}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000180)={"f21f36d8b19adf341c7877a4fb9372940c3caa6e181816def25134d9925454c3918c984a224c2a39622652384dabeabe54909022d619150933e4cc354f8c406e89eec9ec094aaf67f9de2611a56ad4814262a5092ac07ca39d04fa205bc8562b174f6d9f80a4bc61d054d36891b96f4c752356b68cc2761e82f9fa2da680707d08c9ea7f69817ed42ec0e1af40a3596f232a51329707eedf5657efcc953521e3c6bff7172c71b2f32eb65183a33fa2dccbc9fcabc43f0e06deaa79f3c90f663d0b78927d48a07f8a7ce13dce175467e24d996bd3ef371fdee1a46faadff4b9600d8a9aaa9282147335a76607bb5844eff8bb62338e953c031c6c1b7adc0fdd69c26cb811ffd83c94953783b9eb4511812ed6ec19ba729badfa3ba24dda57ae48ffc369dea942360c8efb9ece98c3b75e12d2ba22c2519afe91e425ebddf8cc1f4de09edc577bc86bd0f78a40865a08362aa2468fa6dc717e74a1e510d593092fefeae6daa46a572e9ee4d521e834c8ebfbfe5d053c70814c0d039910d15a5d5a6e4bc527786b462f6a6d0f944a912057bd437d04f3ed7e46646e4c4feb4fe53419d7818c071f597115a6775769a10c2b53f3628d7996ba25bc75ef82ab56b05f2dd0b34acfc1c4d696e3ead6d8e81d8dac28b656e3f32f750f8b181ab2d931d487d3024a01739425346f3caa0fa848def2ef333bb182cfa212b0c9e0f6697c6b0e63435e35cdac4e0e823403764e390ce0a7fd820b286716ad7847122a6768bf4d77279c2758adbbcbc24c3e67e815ca2ba21f40420fcbd1a0a6a98d6eae2e6ef4650656ea8aebb0c729d616930f73d920ab3e3abf5b68a47ecc240b694958fb55607bf72985108ef7ec46e0a44728166c9959fff2bb484980d3be67763df8597794487f5266a9e372603ce6bbbb19b2ebff6e9b418e747a1437a35e208a00a9458630874ea35477258b7ff1bac0d12796bfe0ac4c84c2f77610c6d31fbfcc237bc193e23235f88a7990de803b1ba2258384a8400d46e047d0901191574866255796a720d761c85e36f03a59bd0b4855fed8059a52f052ea7c233cd2e0308c0f9eea0660ac6476fe580d568b0d994647340a0f079d44d48af98876fe12dd8c4485732446238bb3e4f7eb475f67924ab6f0b93b6d2b3320492255c54cb2c25683017806ae65e6b29e2729569995ec268d071de3a4b32570793545d8bd3e12fcf0fdff018510517bcb87d14279356ac4330bca9a392038529027d9d578024129c7d7451ea1562a2d9b0a2b32b70ad0ec653bc8984c19df88db679289db00f8ffffffffffff2ac02a4b8c16d763c022c8190b9c5585c3efc0127d998517a4b261dc4b31af07e8abc822d8c6d052b482058e13a0afdb9975117148ac21ab54764bb5df245b2377a12369d49a9b0d55a82ccc823f26a9a3406000"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000006c0)={0x0, 0x6d, "49a60375d0c50086d99f693108152c8d15ddd306fecf98b7ef861eb5cc77ce24803c754a1b97aa516b28668c3d2ccfb5097d1040d0b2cb285a85383a47efaccb609029f873625b26f645fc27587489b0c9f1162eb8bc67db4c08ba8ddedae7bd4c54e917a6ca82f2b3b8830882"}, &(0x7f0000000740)=0x75) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000780)={r4, 0x81, 0x4}, 0x8) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000600)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 10:33:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:46 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x10001, 0x100, 0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x10004, 0x2, 0x77b4bcb8, 0x4, 0x2, 0xffffffffffffffff, 0xfffffffffffffffb, 0x5, 0x0, 0x400, 0x80, 0x7, 0xffffffff, 0x9, 0x8, 0x6, 0x8000, 0x6, 0x81, 0xffff, 0xbff, 0xa2d6, 0x9, 0x7, 0x2, 0x973b, 0x5, 0x3, 0x3, 0x2, 0x0, 0x200000000000, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x4, 0x0, 0x8, 0x7, 0x5b30, 0x3, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:47 executing program 2: clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$getregset(0x4204, r0, 0x7, &(0x7f0000000000)={&(0x7f0000000180)=""/208, 0xd0}) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffff9c, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x6d61, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xc, 0x72a748cb, 0x2}, &(0x7f0000000300)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x1000}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r2, 0x4) waitid(0x1, r0, &(0x7f0000000080), 0x8, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2e) ptrace$setregs(0xd, r0, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000680)={0x0, 0x5}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000001000)={0x0, 0x7}, &(0x7f0000001040)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001080)={0x0, 0xf1}, &(0x7f00000010c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000001100)=@assoc_id=0x0, &(0x7f0000001140)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000001180)={0xac, 0x2, 0x8000, 0x1, 0x0}, &(0x7f00000011c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000001200)={0x0, @in6={{0xa, 0x4e20, 0x8, @remote}}}, &(0x7f00000012c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000001300)={0x0, 0x6, 0x5}, &(0x7f0000001340)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000001a00)=[{&(0x7f0000000500)=@in={0x2, 0x4e20, @rand_addr=0x2d}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000540)="e0d467af9d9d609c6cc3cde9ab9113093b3b674591cc85d4372dd070d196d88eb7d71b1ea133a47ff969f98df3ff88c871ebfdf9336b6aaa774e2c1a469b90d16a922c639ea518ec64573b63586462724bb2869540a1b2419f798d50c8871a20bbbae8791f7ecd6015ad", 0x6a}, {&(0x7f00000005c0)="a177db39acfd75d0f046bbc7ea9eac613afaf32d57a83659fffe5fb834b12eee05eb4151478cc4", 0x27}, {&(0x7f0000000600)="f332fe22bf2ee6d4c4db801761d41b66b313", 0x12}], 0x3, &(0x7f0000000700)=[@authinfo={0x18, 0x84, 0x6, {0xfffffff000000000}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x10001}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x26}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="88f028837f18228e9a4e02fb1b41b2bd"}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x200, 0x5, 0x10000, r5}}], 0xc8}, {&(0x7f0000000800)=@in6={0xa, 0x6, 0x7fff, @empty}, 0x1c, &(0x7f0000000bc0)=[{&(0x7f0000000840)="9cacb98500a6f8c352b3bae82b2b56ebc28e6d1d578d5f1db87b74e0bc9a1199b335a8b9050d95fc5ddf53e98accebc7924c469d2df2765cb770b6eabe92c63bbd52b9efe1be04c6f360ba53541c6c121d2eb17ec4eafe7b547090d40d2eb6dfd87901270a4869f87ea1b2725eec5a1962faf3bb96774cce239665a628b20e7af6901b3c42cf4bfcd04dc9ff65c57aeba262810177cb5a9b8f4ca885ad3091c14df383908e2c8ff7b1756596475bc4ffa8b55f1e40e625a2f57af244fa70938a1ab487", 0xc3}, {&(0x7f0000000940)="c97372054ee952c53b8380d1d7ec434e2b0e80e353feec60b8db2725e59f63729e80957d19b33973a3f8673c69e8ef828622080fe6c58fc3b45cc52a045e3162e5ea487316938cd7795abeaec72dba94eabb7508879a41", 0x57}, {&(0x7f00000009c0)="b652d2d7fe2cf40eba56dc114c8068fb444449b2f44175da8e29652821b89d5b982824d454050e95fdeb1436e3278b542fbddb8261ccbbfdf95eca65caa2488759b9bf83e85716621af9887c386469", 0x4f}, {&(0x7f0000000a40)="dc7473bccffe381f54f311d77aaae2e9141477515fc5eea264c5bbd52212a19807f676eecdc0ccc09484c75064264cdd5d742ecf7491f58f4a073ee1", 0x3c}, {&(0x7f0000000a80)="52dec5e2d6b954e1b48859c9467d832e8f8a24fac1fd877611e1a558a3c017b56ed0efaf7f55df3c98da615689fa4f50321ac89c4f9a63b3359454cac79e77a4907d721ea76ce69d7f992c9eac6f2be990c0e901121020710b0a020642803feac733b540b7aa2077351369d36b3c50133370f743b9e726fa787fbff6ac940c4615c1d8a349256d1d5420fd831dc1fb0ae6f405070edfb425071692d6393faf180bf3b0ae4586a92c007e46b72eea27", 0xaf}, {&(0x7f0000000b40)="db295a8f0eb1b446f591218e0b15c6d616104774cfde8ed9451749fd1d4fe0f6e28208b92dde8c09dec0fd9e0cf728874206edad1736a58c23588211e0655b88e8b57a", 0x43}], 0x6, &(0x7f0000000c40), 0x0, 0x80}, {&(0x7f0000000c80)=@in6={0xa, 0x4e24, 0x0, @rand_addr="ba39b17ae80e4bce37f59426e646245f"}, 0x1c, &(0x7f0000000f80)=[{&(0x7f0000000cc0)="1ddcb80958671db6a8d1ab13bffa7c252d06984027d0749db2d2349294f7eb29af", 0x21}, {&(0x7f0000000d00)="845c89eb6a28210c9fae9e1d5c0315e18763ac18e148ae00cf26b4069a645005729acc9bf37172c90c0a2b1c26c61e652e0eeebd22ea20b3456fc767094e776b20", 0x41}, {&(0x7f0000000d80)="322bb5254a42cabbea37085a712716283774cfe4888d30e7c40ccca6568a9604d91d692412932fcf1c42930b1e3088a9d6c816fd7014150517384f88218371445de89dd54305562f26baa026c67f4442619892ea23f8e3475643b42b975d5936351cfddb481583aa024bdb6f4ae3d6409e40dde9b57178af1febedde8be9babb3a14814479758f65c18a029cbca00ff9f71526eda5de4a0757498737bdc0ce41c99236c172fb0c7ec482a273df7a7abf4fb0c821028cbb49e5c18b5f", 0xbc}, {&(0x7f0000000e40)="c07a0f4662620889e0b9fa63f923651c383d49ee04e2580280d1e45ddf2705e6daa76b6da8c1cdad2b177b09a8a833b28209c461224961ea67b5002775ee295d3fef3db3bd03dfd27b9c9ea24133be262c4daf9dd4cdb628673a8363a706e052ffb8f75dd0f698aea2f2cf0fd2e8d7c980cb0dd2aadcbdb4a70430ab67765a819bdc46c05ab7573a107d96f84534b58fb75a1fc0411e6972748346b82443877b4f28569e9af802ad094e6dd68a65d60c714228ccab20cfbeafab8192939d350bd829e11b07434580296466e17eff19f4d081112a918cee456df49bcf19e6babd5fdaedf7a8f55e0b2994612848345cccc66a50d53daf1f", 0xf7}, {&(0x7f0000000f40)="50a6faf6f05adf1bd7997d9cb74ddcd0f9aa2b92f30d4cbed631a590add08a661c529aef", 0x24}], 0x5, &(0x7f0000001380)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x0, 0x3e, 0x1000, r6}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x80, 0x6, 0x1, 0x8, 0x2f1, 0x2, 0x4, 0x6, r7}}, @sndrcv={0x30, 0x84, 0x1, {0x62a3, 0x0, 0x8008, 0x8, 0xd4d0, 0x7, 0x1, 0x720, r8}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x6}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}, @sndrcv={0x30, 0x84, 0x1, {0xbf, 0x2, 0x8004, 0x3f, 0x400, 0x3, 0x4, 0x1000, r9}}, @init={0x18, 0x84, 0x0, {0x8, 0x0, 0x1, 0x3}}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0xc00, 0x4, 0x0, 0x7ff, 0xfffffffffffffff8, 0x1, 0x3f, r10}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x8, 0xfff, 0x100000001, r11}}], 0x168}, {&(0x7f0000001500)=@in={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000001780)=[{&(0x7f0000001540)="041d147a25759707d01e4ee3f4cf43d2f195b300d62aaf134ded11e2759620935d25e9a55bda3bff04946e3fcad2a93cd74f091d31598bd1a699608c082de4829fc9f85eb80563b99a35e6c34d486ae464e5309833ffcc71631e163ef403f4a439543669a210a3997291fab4df6683243fc5e78ae21751fd16e020c835dfcdd541e8ac10df9f0d41c24f257d009e336c3313d5558a912cbdff0ce970df864971fb449f798b3158747de6c8b7dcde1ce4dfe8c9e3b62bb1816f", 0xb9}, {&(0x7f0000001600)="d1b4c327d4f281ad3e2d2dbd667e9631bcb044fb3d5a02d2a1d1a34c", 0x1c}, {&(0x7f0000001640)="1ed11f16a75bb1759a6ee4ca400c3077ce65c7a1781b6723e947b821666415a29ac7be3073eede2a520bc9b785e5edfc66022d520a045ecdc73d1db0bd2efa08c1f910e36fe7ec70998f82778e529e8becd4b423d1578304cb459cb9c71b5d", 0x5f}, {&(0x7f00000016c0)="7dc0ac3e48ae5cd65140fa6989b7cbb49cee7a1bcac5185625dd7f5a74db483195d52a8af278327b9b2cebc495e82ccdf4c3e48206862f899ad1f28887f7677c9d3db93a8c742fea2231fd1836f3b3dd9e98dc1040c6c47cf043e41c5d080dbf9dcdbcd105dc844cbe452bc1fadc9cbe89caad4d85cad884a708322255f53591d58beebe1d0c0a030fb2e4d1adbab1980c06c7b38fe7698881a0cb53ec6a3d9b85", 0xa1}], 0x4, &(0x7f00000017c0)=[@authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0x30, 0x814}, {&(0x7f0000001800)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001940)=[{&(0x7f0000001840)="267bef0c2acb80731d4c000ffe7dc8f4664b09c7eac48badca47923d5b461260f914a2b737725de5e17d04c5e4021efee072c468178ef0daa02b46962ff7715a25dd9c44c0f2a73750ab70c7a734fc76e364cf7067ce4fb245d173e0587d9555f3", 0x61}, {&(0x7f00000018c0)="eb8ded2cae9da957d0187468c6c03df24f5c2aaf79d8d5775dc3ee87210a6cabe109c59ad686f7c7c23a25da150944a9a58976f3d89679c2fbe0c22037a5099e7ec9e0a9", 0x44}], 0x2, &(0x7f0000001980)=[@dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @authinfo={0x18, 0x84, 0x6, {0xf26}}, @init={0x18, 0x84, 0x0, {0x9, 0xc1e5, 0x7, 0x380000}}, @authinfo={0x18, 0x84, 0x6, {0x54}}], 0x68, 0x4000}], 0x5, 0x800) ptrace$cont(0x4204, r0, 0x2, 0xa05004) 10:33:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}}) 10:33:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1071.209940][T10214] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1071.296502][T10214] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x2, 0xf, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x7, 0x0, 0x2}]}, 0x30}}, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x80002) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000140)="c744240029000000c744240200000000ff1c248f493001f564d9e9c44265ac970040000066baf80cb88af98482ef66bafc0cb0faeec4a2bdbf2167450f30460f013c8dca110000b805000000b90a0000000f01c166b83d018ed8", 0x5a}], 0x1, 0x1, &(0x7f00000001c0)=[@cr4={0x1, 0x2}], 0x1) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) [ 1071.369410][T10214] Error parsing options; rc = [-22] 10:33:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}}) 10:33:47 executing program 3: unshare(0x4000000) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@l2, &(0x7f0000000180)=0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0xb08, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x40000) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x2000, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1071.719640][T10349] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}) [ 1071.765635][T10349] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1071.898349][T10349] Error parsing options; rc = [-22] 10:33:47 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x1, [0x7]}, 0x6) 10:33:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x1ff, 0x8, "1553d08b56e940ff31697f1ad2448def7206eba438d72886052ed1fdb69c053ccc78a1bf397119214e8258006683f106141bfb5ee1da3e8c90b444a6380e42", 0x31}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)="1ad07cd436dfc77d3097edd8e94a5617603fcc9355330d17cd7b73b2fd0bd95726c53415896b1fd67aa13606ef598e039bbb74f9995afa67af06599afe9f406ff62f1fa9abdefa8d", 0x48}, {&(0x7f0000000040)="aee172343d01d63eb556fc8c0c3c6972f18407031909d6", 0x17}, {&(0x7f0000000200)="882d3bdabf96bff98c9f89548c9199333077eb47f50710e4b669ef7cbabdcecf32d7c21555f960aa52bb2bd4adcb17fcd675a0372be8bfdfc254ea3714f3c871f2e1c80f306a4b6ea791684d661b3ebda6feb20ab4f3a8", 0x57}, {&(0x7f0000000280)="80b8bfce6b7e85d8a1837756dd056f7de96afc7c7590bbb81b07fba9c37a78ed9460ed70643204deeb0927239e5fc228b331ab4b8b4c56424e8ea69e1cbaadb80893353878c56a31c22f110cfe8d704170aff51d848fc3bda164eee341c101f0209952f385165db50848c2a05a6796909fc73cd1d12a643e23d945a5dcef8785b5f534b1d25d57e5c39a4233e43c725a03d179f5127528ad0eb880f7439eff3909e9107f09df5605d54b85e4df02734ac9c41e33fae237fe537db2134c955560b825636287d0e0a7368cf6734021bceaf5158121fa1b758d9789bf6443d503813cb0b437deb9289d4e9aa6671e8988a7", 0xf0}], 0x4}, 0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x800, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000440)=0xfffffffffffffff7, &(0x7f0000000480)=0x2) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 10:33:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:47 executing program 3: unshare(0x20024000904) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) recvmmsg(r1, &(0x7f0000001400)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000880)=[{&(0x7f0000000180)=""/239, 0xef}, {&(0x7f0000000280)=""/88, 0x58}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/213, 0xd5}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/123, 0x7b}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000800)=""/122, 0x7a}], 0x8, &(0x7f0000000900)=""/205, 0xcd}, 0x3}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/108, 0x6c}, {&(0x7f0000000300)=""/63, 0x3f}], 0x2, &(0x7f0000000ac0)=""/13, 0xd}, 0x2}, {{&(0x7f0000000b00)=@ipx, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000b80)=""/115, 0x73}, {&(0x7f0000000c00)=""/99, 0x63}, {&(0x7f0000000c80)=""/66, 0x42}], 0x3, &(0x7f0000000d40)=""/235, 0xeb}, 0x3f}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000e40)=""/246, 0xf6}, {&(0x7f0000000f40)=""/24, 0x18}, {&(0x7f0000000f80)=""/152, 0x98}, {&(0x7f0000001040)=""/225, 0xe1}, {&(0x7f0000001140)=""/208, 0xd0}, {&(0x7f0000001240)=""/43, 0x2b}, {&(0x7f0000001280)=""/55, 0x37}, {&(0x7f00000012c0)=""/30, 0x1e}], 0x8, &(0x7f0000001380)=""/101, 0x65}}], 0x4, 0x40012000, &(0x7f0000001500)) 10:33:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}) 10:33:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}) [ 1072.220381][T10485] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1072.241338][T10479] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1072.249091][T10485] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1072.338165][T10485] Error parsing options; rc = [-22] 10:33:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x1ff, 0x8, "1553d08b56e940ff31697f1ad2448def7206eba438d72886052ed1fdb69c053ccc78a1bf397119214e8258006683f106141bfb5ee1da3e8c90b444a6380e42", 0x31}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)="1ad07cd436dfc77d3097edd8e94a5617603fcc9355330d17cd7b73b2fd0bd95726c53415896b1fd67aa13606ef598e039bbb74f9995afa67af06599afe9f406ff62f1fa9abdefa8d", 0x48}, {&(0x7f0000000040)="aee172343d01d63eb556fc8c0c3c6972f18407031909d6", 0x17}, {&(0x7f0000000200)="882d3bdabf96bff98c9f89548c9199333077eb47f50710e4b669ef7cbabdcecf32d7c21555f960aa52bb2bd4adcb17fcd675a0372be8bfdfc254ea3714f3c871f2e1c80f306a4b6ea791684d661b3ebda6feb20ab4f3a8", 0x57}, {&(0x7f0000000280)="80b8bfce6b7e85d8a1837756dd056f7de96afc7c7590bbb81b07fba9c37a78ed9460ed70643204deeb0927239e5fc228b331ab4b8b4c56424e8ea69e1cbaadb80893353878c56a31c22f110cfe8d704170aff51d848fc3bda164eee341c101f0209952f385165db50848c2a05a6796909fc73cd1d12a643e23d945a5dcef8785b5f534b1d25d57e5c39a4233e43c725a03d179f5127528ad0eb880f7439eff3909e9107f09df5605d54b85e4df02734ac9c41e33fae237fe537db2134c955560b825636287d0e0a7368cf6734021bceaf5158121fa1b758d9789bf6443d503813cb0b437deb9289d4e9aa6671e8988a7", 0xf0}], 0x4}, 0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x800, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000440)=0xfffffffffffffff7, &(0x7f0000000480)=0x2) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 10:33:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:48 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x11, &(0x7f0000000080), 0xc) 10:33:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:48 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000440)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) 10:33:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}) 10:33:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x89', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1072.692378][T10606] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1072.762268][T10615] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x55d7479fe5f14a45, &(0x7f0000000000)="268990bb57571ff24b61617b467a", 0x0, 0x4000}, 0x28) [ 1072.827236][T10615] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1072.850000][T10615] Error parsing options; rc = [-22] 10:33:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:48 executing program 2: setreuid(0x0, 0xee00) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="14255012e6e0fce34fb3311cb63465fd000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000001c0)=""/97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:33:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}) 10:33:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xfd', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2f, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\x00\x02\x00\x00\x00\xe0\x00', 0x19, 0x3, 0x0, [0x20001680, 0x0, 0x0, 0x20001fd0, 0x20002000], 0x0, 0x0, 0x0}, 0x108) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid\x00') 10:33:49 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1000, 0x2040) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @null, @netrom={'nr', 0x0}, 0x11b, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1000, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x4380) fchmod(r1, 0x42) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}) 10:33:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:49 executing program 2: epoll_create(0x0) epoll_create(0x0) r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000100)) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f00000000c0)=0x7ff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000200)={0x5, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @link_local}]}) write$apparmor_current(r0, &(0x7f0000000240)=@profile={'permprofile ', 'wlan1\xd0cgroupnodev.%)\'[selinux\x00'}, 0x2a) [ 1073.416569][T10851] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1073.456563][T10851] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1073.554176][T10851] Error parsing options; rc = [-22] 10:33:49 executing program 1: rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x100000001, 0x729000) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x800000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r4}}, {@smackfsroot={'smackfsroot', 0x3d, '(keyringuserGPL'}}, {@smackfsdef={'smackfsdef', 0x3d, 'rmd160(2\x12A\x1d\xc1\xf46\x00'}}]}}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) unlinkat(r5, &(0x7f0000000100)='./file0\x00', 0x200) fanotify_mark(r5, 0x84, 0x10, r5, &(0x7f0000000140)='./file0\x00') keyctl$dh_compute(0x17, &(0x7f0000000680), 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)={'rmd160(2\x12A\x1d\xc1\xf46\x00'}}) 10:33:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}) 10:33:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x90\x1cW', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:49 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f0000000200)={0x5, 0xfffffffffffffffe, 0xfffffffffffffeff, 0x0, 0xffffffffffffff9c}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L+', 0x7}, 0x28, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40101) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000100)={0x0}) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000001c0)=0x7fffffff, 0x4) r4 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x7f, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000180)={r3, 0x80000, r4}) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}) 10:33:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xfd\xfd\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xb0\x1eW', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1074.083242][T10990] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1074.101485][T10976] could not allocate digest TFM handle rmd160(2AÁô6 10:33:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}) [ 1074.165699][T10990] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r1, 0x0) flock(r0, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x400, 0x0) 10:33:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1074.249518][T10990] Error parsing options; rc = [-22] 10:33:51 executing program 2: epoll_create(0x0) epoll_create(0x0) r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000100)) migrate_pages(0x0, 0x2a, &(0x7f00000004c0)=0xfffffffffffffffe, &(0x7f0000000000)=0x2) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f00000000c0)=0x7ff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000200)={0x5, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @link_local}]}) write$apparmor_current(r0, &(0x7f0000000240)=@profile={'permprofile ', 'wlan1\xd0cgroupnodev.%)\'[selinux\x00'}, 0x2a) 10:33:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xc3\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:51 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) clone(0x106, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}) 10:33:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x3e6, 0xd56c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:33:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000000)="c0dca5055e0b430fd8d4befb827907d99e53c830a1c25e") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x100002, 0x20040002}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x40000002, 0x27000000}) 10:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\xff\xef\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1075.292933][T11122] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xfe\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1075.348487][T11122] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}) [ 1075.428228][T11122] Error parsing options; rc = [-22] 10:33:51 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() sysinfo(&(0x7f0000000440)=""/4096) lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x8, &(0x7f0000002640)=[{&(0x7f00000001c0)="b06c56c95d831d10d6b06f1baf843ebc72b247e4bcb27eeb5b3c4707e4aff039ea4074278141e298bd6ebd8c70acc49f68af1382f0c194787ce2f8882c1117a571f92976", 0x44, 0xa9aa}, {&(0x7f0000000240)="3261f2fdee8d13cdfc5ee59a4496cc22459036bd54d60af7", 0x18, 0x100}, {&(0x7f0000000280)="d9dde9d1356459317023a2148ac4417265b099f6d112dd08306984474422ecf97f41186fb9150d416158d9a3ede9953922b39d61d432b57b709c122a2eb1bb9e2f61cc6e2d5362ad812df425985bda84ac178e0d5d467e932c7d4cc0059bd46b831bfb6ff56caa31bb83b55b6c9472df0810ee858a16a77b9dcd0c6be8dc5d009e6f48", 0x83, 0x3}, {&(0x7f0000001440)="2cfeb23f1716016722f304983348ce83d180ee512c1f929c1aeba5742dc0ad9b21e7f3524244607354095a7ed81a5eebdf8460596540", 0x36, 0x7fffffff}, {&(0x7f0000001480)="de08749952b06df52e267e37a63906cb656fe0f4411296b8f8119f8d44abde", 0x1f, 0x6}, {&(0x7f00000014c0)="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", 0x1000, 0x8}, {&(0x7f00000024c0)="6bc55c79dc1d1b94d46571d8121a9e101d905139db88d2f07cf5d11784c775e5a770f9d6bd9a998107807b39c9f9fa36b3e206d40f769aacc4614b7275d6b1a5fa9c8e615bfe", 0x46, 0x3}, {&(0x7f0000002540)="dfa0c2acb2493bfe9a12730382c1d9ae663d7e0589dc4aa83d21af41a9e141f750a30922316c9aff16187a9f00210f9f3ba4945682e245d76393a736d9e44ac795a21f702f54d81168649f736d90bed1d9e0795a1338eea8022fb746c932148bad4076b49c726f7afd6ea400ba897d90457a9b996c1cbab52e48c2db19efa5f710f11d37b5088949fa07b0d0c757305b5a9e7bfccb9972a230c767a9e6f45389780728e6ba4ae42d3badb7ddb89e5024f425d3fa105f8fde2a98d901bc6f0e116bdaee711c287678be148b528a37dd0583db4552cd6a29ae78f4e4341ccc1b", 0xdf, 0x6}], 0x200000, &(0x7f00000027c0)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x8000}}, {@resuid={'resuid', 0x3d, r1}}], [{@fsuuid={'fsuuid', 0x3d, {[0x74, 0x35, 0x35, 0x33, 0x77, 0x3d, 0x38, 0x39], 0x2d, [0x72, 0x65, 0x77, 0x62], 0x2d, [0x0, 0x61, 0x7d, 0x66], 0x2d, [0x63, 0x64, 0x0, 0x66], 0x2d, [0x30, 0x77, 0x34, 0x77, 0x62, 0x66, 0x35, 0x77]}}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ecryptfs\x00'}}, {@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000002880)='/dev/amidi#\x00', 0xffff, 0x87d9d82a6277333c) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x6) tkill(r0, 0x11) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1075.804046][T11251] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1075.866993][T11251] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1075.898062][T11251] Error parsing options; rc = [-22] 10:33:52 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readahead(r0, 0x0, 0x6) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/8, &(0x7f0000000040)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/4096) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xffffffffffffffff, 0x0, 0x0) 10:33:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x40000000001e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x80, &(0x7f00004ad000), &(0x7f0000000080)=0xfffffffffffffcbe) 10:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}}) 10:33:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:52 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = dup(0xffffffffffffff9c) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x5, 0x6, 0x200}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0xc917, 0x5, 0x4, 0x80000000, {r2, r3/1000+10000}, {0x0, 0x0, 0x6, 0x7, 0x52, 0x1d, "fbc7230a"}, 0xff, 0x2, @offset, 0x4}) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}}) [ 1076.399099][T11466] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00UU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1076.478939][T11466] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1076.509280][T11466] Error parsing options; rc = [-22] 10:33:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:52 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020b000fbb9550e50b44f00200000000000000"], 0x10}}, 0x0) 10:33:52 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x5452, &(0x7f0000000100)={'veth0\x00'}) tkill(r0, 0x11) wait4(r0, 0x0, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:52 executing program 2: r0 = getpid() r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x88000, 0x0) write$cgroup_pid(r1, &(0x7f0000000080)=r0, 0x12) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregset(0x4205, r0, 0x206, &(0x7f0000000140)={&(0x7f00000000c0)="72ac74e448ad93b9bd6c0c9c7be9cf2a98b4133827fb0d3264b7de37e8ce1f6ecfa90f42d042a7c30ceec1d36b4657afe3d055fdadaac664c653f1154a176a91445b2adccab68fc8f44d86a21bb769bd3ea291a1c0ca7dbeac4defd77901cd5e08052be99f", 0x65}) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x3, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 10:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}}) 10:33:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00UU', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0xcbb1}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) nanosleep(&(0x7f00000000c0)={r1, r2+10000000}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000007, 0x2010, r0, 0x8000000) [ 1076.912135][T11602] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}) [ 1077.014816][T11602] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1077.049363][T11602] Error parsing options; rc = [-22] 10:33:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x2000000042042, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="4316"], 0x2) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x44080, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000240)=""/183) 10:33:53 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000100)={0x765, 0x20000000000, 0x20, 0xbeb, 0x6}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}}) 10:33:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:53 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0xd96c, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net\t\xbd\xa1^\xa7L-ocm\x00\b\x00') read$FUSE(r1, &(0x7f00000002c0), 0x1000) [ 1077.496190][T11739] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1077.563395][T11739] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1077.629170][T11739] Error parsing options; rc = [-22] 10:33:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x2, 0xffffffffffffb746, 0x3, 0x6}) socket$inet6_sctp(0xa, 0x5, 0x84) 10:33:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}}) 10:33:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000200), 0x4) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd0d8, 0xffff, 0x100000000, 0x8, 0x2, 0x3f, 0x88, 0x1ea, 0x38, 0x2e3, 0x100000001, 0x2, 0x20, 0x2, 0xffffffffffffff7f, 0x3, 0x3f}, [{0x70000003, 0x2, 0x4, 0x6, 0x7f, 0x1, 0x1f, 0x7}, {0x5, 0x3f, 0x1f, 0x7fb, 0x3, 0x3, 0x8, 0x4}], "2879628d37e4394d5452ea63531c1c99955e647e8a2e336406a9960048fad17f7aed576044b41bded3ddf97665d9f11778bc27aa24fca90ef4d882939018971bc37e05cfde6b5941a75cc1882f2817c08c5129dcfa9a9328a0ba341803011fe0674f9aa525ef6d20f60e6d9f26f3410e2c962b1bdc79ed3d023872f6eaf9112e882fe15dfe826d44b8d2e97e66be66144a94ecf44c154fe92209fd505a8457138ff57a9b4ef8897f9e32590ce91aee8e87035626b4321b9fe3120d4933c75381337001eb"}, 0x13c) 10:33:53 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r2 = io_uring_setup(0xc6d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0xff}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x402142, 0x0) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video2\x00', 0x2, 0x0) sendmsg$netlink(r1, &(0x7f00000004c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)=[{&(0x7f0000000100)={0x108, 0x34, 0x100, 0x70bd2a, 0x25dfdbfd, "", [@generic="8f226da2fa93d973f5aa17bfc84330d019e73bf8a441e27ace169c46dd3516cc9936ee95bb4d3ccea68739dc6d3311bcc9c6115915506b861c063cdf3dafe25b367edd89ec2ddbe4f1de131bc064532b0abe1ef382c3494824f722b41a7c5ede32adec52d08155295be2949c9104d057dc0b2de15430d980c25a02ece0e953b8a71d8cde4c57a1e5cfee925abbdfac7e4100e3bc3b98bdb6db0d93c2a94ca2a0851ae665a661ba34b3d9cc777cd8008340feda4c9a26fe24ac1998467e9215c8bc83594de5123203e1a13664c00c048bce6c71d3433f268615c3f72cb874f5aa12fc4d75dce29834", @typed={0x10, 0x8f, @str='ecryptfs\x00'}]}, 0x108}], 0x1, &(0x7f0000000480)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r4]}}], 0x30, 0x40800}, 0x4000000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') connect$vsock_stream(r3, &(0x7f0000000500)={0x28, 0x0, 0xffffffff}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1078.019031][T11872] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff}}) [ 1078.090015][T11872] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:54 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffb}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x11}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x4202, r1, 0x10, &(0x7f0000000100)) 10:33:54 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) dup(r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x1000, 0x2, 0xfffffffffffffc00, 0xd1, 0x3}, 0x14) [ 1078.171907][T11872] Error parsing options; rc = [-22] 10:33:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}}) 10:33:54 executing program 3: unshare(0x10000) timer_create(0x6, &(0x7f00000002c0)={0x0, 0x2000000000000015, 0x3, @thr={&(0x7f0000000100)="70d3dda623c5398247d5f5c7d68a0f52fab15b27ed38b2d94d20c4622c5d1e1635cf0316df02c1f7df1858d900dabdd87630e1e1543b7bf634bc65837d35899425bce5dceaa7230110e8c84a3fd864a76119692683e7a65348624a0901a5d4ae9f26dba2767037d7ed0e721283d082289f22248ef7cb937d3e70e356145491fe7b8c8fe6e3ffaecafbf5c956b638869e96cbe9d96b4419e3d6d70e06ea5bee21acf0c19886f06798f5fe2751e0c16e96cd7ad0ae728967bd992fd390e06d1adc036a18a13b9001b61e8aa0ebf6b2f9c9f65f8e269b8ca0ce5da38939d6", &(0x7f0000000200)="519e4eb6abfe715c6a19c69304706586912c8deae15d17e05d05fa34e54cdccc7a0d3143499193a301440acfb7b0d8d212879f76dc115bf5cf84a49b4e10667d850c6d25eeff92c72ab8a6e169693c5bc5"}}, &(0x7f0000000280)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000440)="00162b3d084ca1658fdb87ce15fb27be64a8173a4b1d2d1501ca64542cb6297d3082b00377964e2ad84591b30ad5fbbb1f82a26db4c1b87d1cdf3d4dab270209f3", 0x41, 0xfffffffffffffff8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, r2, r3) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300030b000000000000000000000001000972272b0000000000030006000000000002000000e0000001000000000000000002000100000000000000070b00000000030005000000000002000000e00000010000000000000000"], 0x58}}, 0x0) 10:33:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}) [ 1078.644626][T12017] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:54 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0xa30000, 0x9, 0x80000000, [], &(0x7f0000000040)={0x9b0960, 0x1, [], @ptr=0x9}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x8004ae98, &(0x7f0000000680)={"f21f36d8b19adf341c7877a4fb9372940c3caa6e181816def25134d9925454c3918c984a224c2a39622652384dabeabe54909022d619150933e4cc354f8c406e89eec9ec094aaf67f9de2611a56ad4814262a5092ac07ca39d04fa205bc8562b174f6d9f80a4bc61d054d36891b96f4c752356d88cc2761e82f9fa2da680707d08c9ea7f69817ed42ec0e1af40a3596f232a51329707eedf5657efcc953521e3c6bff7172c71b2f32eb65183a33fa2dccbc9fcabc43f0e06deaa79f3c90f663d0b78927d48a07f8a7ce13dce175467e24d316bd3ef371fdee1a46faadff4b9600d8a9aaa9282147335a76607bb5844eff8bb62338e953c031c6c1b7adc0fdd69c26cb811ffd83c94953783b9eb4511812ed6ec19ba729badfa3ba24dda57ae48ffc369dea942360c8efb9ece98c3b75e12d2ba22c2519afe91e425ebddf8cc1f4de09edc577bc86bd0f78a40865a08362aa2468fa6dc717e74a1e510d593092fefeae6daa46a572e9ee4d521e834c8ebfbfe5d053c70814c0d039910d15a5d5a6e4bc527786b462f6a6d0f944a912057bd437d04f3ed7e46646e4c4feb4fe53419d7818c071f597115a6775769a10c2b53f3628d7996ba25bc75ef82ab56b05f2dd0b34acfc1c4d696e3ead6d8e81d8dac28b656e3f32f750f8b181ab2d931d487d3024a01739425346f3caa0fa848def2ef333bb182cfa212b0c9e0f6697c6b0e63435e35cdac4e0e823403764e390ce0a7fd820b286716ad7847122a6768bf4d77279c2758adbbcbc24c3e67e815ca2ba21f40420fcbd1a0a6a98d6eae2e6ef4650656ea8aebb0c729d616930f73d920ab3e3abf5b68a47ecc240b694958fb55607bf72985108ef7ec46e0a44728166c9959fff2bb484980d3be67763df8597794487f5266a9e372603ce6bbbb19b2ebff6e9b418e747a1437a35e208a00a9458630874ea35477258b7ff1bac0d12796bfe0ac4c84c2f77610c6d31fbfcc237bc193e23235f88a7990de803b1ba2258384a8400d46e047d0901191574866255796a720d761c85e36f03a59bd0b4855fed8059a52f052ea7c233cd2e0308c0f9eea0660ac6476fe5863346c1f994647340a0f079d44d48af98876fe12dd8c4485732446238bb3e4f7eb475f67924ab6f0b94a16d347378f5f3b6d2b3320492255c54cb2c25683017806ae65e6b29e2729569995ec268d071de3a4b32570793545d8bd3e12fcf0fddc018510517bcb87d14279356ac4330bca9a392038529027d9d578024129c7d7451ea1562a2d9b0a2b32b70ad0ec653bc8984c19df88db679289dbc5170afa45719f772ab929c02a4b8c16d763c022c8190b9c5585c3efc0127d998517a4b261dc4b31af07e8abc822d8c6d052b482058e13a0afdb9975117148ac21ab54764bb5df245b2377a02369d49a9b0d55a82ccc823f26a9a34062"}) 10:33:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x2c, 0xfffffffffffffffe, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) [ 1078.696527][T12017] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1078.874447][T12017] Error parsing options; rc = [-22] 10:33:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000}}) 10:33:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:55 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:55 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x340, [0x20000800, 0x0, 0x0, 0x20000830, 0x20000a68], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/832]}, 0x3b8) 10:33:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 10:33:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}}) [ 1079.352835][T12159] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1079.430894][T12159] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:55 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0xfffffffffffffffb}}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4000000) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 10:33:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc3}}) [ 1079.495268][T12159] Error parsing options; rc = [-22] 10:33:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000080)=""/103) accept$ax25(r2, &(0x7f0000000100)={{0x3, @bcast}, [@null, @default, @bcast, @null, @netrom, @default, @netrom]}, &(0x7f0000000180)=0x48) 10:33:55 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7f, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) bind$isdn_base(r3, &(0x7f0000000000)={0x22, 0x8, 0x3, 0x9, 0x7}, 0x6) close(r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) splice(r2, 0x0, r3, 0x0, 0x200, 0x0) 10:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}) 10:33:55 executing program 2: r0 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r0, &(0x7f0000000140), 0x0, 0x12001, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f00000003c0)="9970024feb69d9cd349b0de6999ac5568e3e3b45b42c7433d9ea6a21fa5dcd05b43561f9f03a8f79a22b99766fa80ee083c2f7bb45f792395a5d1a3c137bcad9ee7258be556e9f9dc367316e0a5f8d76de862d58c95d1f284d691e53b120fa6dab58c4cc1a") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="010029bd7000fcdbdf2507002e5300001c0005000800010075647000100007000c000300e13fc935000000000c000256a0c1000800020001000000180007000c0003000000000001000000080001006e060000264c036d40d678b700c77debfc9ce8d9347191e4cd8696e22e2cf4a773c0c7c8a65c5d0a446fa6c85777d21a9b7165816b70088a26c7acd3d1614baa2eb28c09b1cc4bde3423d55d1022b534ededbd8a1f920008040fcd5966db9f8f95"], 0x1}, 0x1, 0x0, 0x0, 0x4004050}, 0x95) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000380)={@empty, r4}, 0x14) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = socket(0x0, 0x6, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000008c0), 0x0) accept4$unix(r5, &(0x7f00000005c0)=@abs, &(0x7f0000000540)=0x6e, 0x800) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000000), 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYBLOB="81000000abe18c733bfb3bc8ed000000000000000048d5f2f0652ecc44de40e02e3fd5a9bef80a790381dd4ce6a83125b345d0a03c68da168f8ee57c10842b40cc13182b71400fd4d79c9882d2c9f22606b6d99213a9e3fd9c5a6333191fdd357aa3ab82d4927b0348bdc19b557ab0f3fdd95c3a4317bc46264363dd4408fbb4f3"], 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xab}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={r7, 0x2000000000000, 0x4}, &(0x7f0000000680)=0xc) setsockopt$llc_int(r6, 0x10c, 0x9, &(0x7f0000000040)=0x9, 0x4) sendto$llc(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x200000000304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) setsockopt$sock_timeval(r6, 0x1, 0x14, &(0x7f0000000080)={0x0, 0x2710}, 0x10) recvmmsg(r6, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c500)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x5, 0x0, 0x0, 0x7d48bddc}, 0x100000001}, {{0x0, 0x0, &(0x7f000000c700)=[{&(0x7f000000c680)=""/90, 0x5a}], 0x1, &(0x7f0000000640)=""/16, 0x10, 0x7f}, 0x200}, {{&(0x7f000000c780)=@ethernet, 0x80, &(0x7f000000ca00)=[{&(0x7f000000c800)=""/210, 0xd2}, {&(0x7f000000c900)=""/92, 0x5c}, {&(0x7f000000c980)=""/82, 0x52}], 0x3, &(0x7f000000ca40)=""/40, 0x28}, 0x206}, {{&(0x7f000000ca80)=@pppol2tpv3in6, 0x80, &(0x7f000000cd00)=[{&(0x7f000000cb00)=""/255, 0xff}, {&(0x7f000000cc00)}, {&(0x7f000000cc40)=""/180, 0xb4}], 0x3, &(0x7f0000000580)=""/5, 0x5, 0x2}, 0xffffffff}], 0x5, 0x1c, 0x0) [ 1079.914294][T12303] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1080.008861][T12303] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1080.049290][T12303] Error parsing options; rc = [-22] 10:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}) 10:33:56 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setregset(0x4205, r0, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)="977940f296a3fef32c76afa0e064eba902010001d9fb8c013cf1a6643d93f668e15253837110b605f9dfca344047ffd79d0288610324684935062623cad16c850a8d44abc82db1b3d88c7e675c3057de1b0ff6336184f8ef08f6252dcf16df99f58130e95c1159cede9b367f21ffd9bda03410ebfc8b78687ddbcf0d04638bc969e46f2082d7b6d81dc7f66c60", 0x8d}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x16, 0x0, r1) keyctl$unlink(0x7, r1, 0x0) 10:33:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:56 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x7, 0x9, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x7, 0x9, 0x3, 0x40, 0x57, 0xffffffff, 0x3ff, 0xfffffffffffffffb, 0x7fff, 0x4, 0x5, 0x1686, 0x95, 0x1f, 0x1ff, 0x4, 0xffffffffffff0000, 0x3, 0x5, 0xcd3, 0x1f, 0x7ff, 0x80000001, 0xffff, 0x3, 0x2, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x800, 0xffe0, 0x4, 0x6, 0x37f7, 0x0, 0x3}, 0xffffffffffffffff, 0xf, r1, 0x2) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x20000000, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000002700)={0xbe, ""/190}) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000200)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)="3c7c87d125fc8adc9d860219f077f4d38065a9319acee61d09182d1e8735e8baa43153480813f0140a76991bf19c262b074a5d5937f755f1bd904629628e0e948f6abd822b4709365f6dfbbfc8f765d41ddf3dad5a7abeceb950fd00c8dce2c847fed872a3bd3005c03692ea755a8fbb61c389969c61715840cb3b04a98ad9917b5cb0a21a0a93e62cc25dc375d0bac53c442379a3929b1f862185ccc3907a53b7fba00ff2e36496cdf09a883337099af99a6cb8904740445c3688629272a27e", 0xc0}, {&(0x7f0000000340)="0dcf5ef35b2b60284eb86c76cd96b6071c39cab959bd4d6cc8094436aa435ac56f67578e203f0fbf69a0216217822033706ba0916e55dc83b58108d6c0ca9019c65948cd0e898d9f9ea9a1ad4191a399ef8f2b6a54795099bf050397ed43de0033568af81b7b12e8446198212c6399f1ee43e2adfa4f8f81437d81663f4327f070243e6de5fd1e8f94c04bf6cc1cdeffb2346991c707d79b14d62d4a726aa83224e617196d0805fa433aa4764792a9ec0ae5a318bb63a06dfb1eabab4427a05b086f138b543e9ecfa86d183184b4", 0xce}, {&(0x7f0000000440)="81761bcfbb7fd00061bb0a01921fd2bafd0c4e90023f4a6d27671ce3db44921a50e4790795c11c1137d3186e86a39d6db992203cd15e737a09f6b03674b236206053d00311315a0718edadbdcc6d5309a49bceddc2078272ef2d0f0717c86553b31320bcd2f3e84be8087e936e", 0x6d}, {&(0x7f00000004c0)="679e02166745e57adbafd8ec9f63859bf643a4de68586b3bd429c2ac1a4e43cd007b27f5cde1ce758e1208fa780d47e5a3770cd0d25430b03acef811007f3e1f143f0f", 0x43}, {&(0x7f0000000040)="4edd5de3d3d1a8a24f0769cc611236e5da2a25670b3349a3af24afbf462e4e09", 0x20}, {&(0x7f0000000540)="ca01cbd714daccf3cc35228536238179235f1a79e5f1f41dd5b72231fdbb5e9745d7b38e84f99200c40449e485c732367cadc1ef72f009b48bad7a3cb63e99f8c79027e1d0cd2c35bcda08e1003f124a0a3064e1b4b736d781ea3a3d27ac926bc78f79310f3a3ace2bea60070c621c04e2882b932555512af439fcc66ff4d0d7d3b2e902f0e7f79c40ba55ff", 0x8c}], 0x6, &(0x7f0000000680)=[{0x1010, 0x0, 0xbcf, "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"}, {0x1010, 0x29, 0x3, "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"}], 0x2020}, 0x20000800) 10:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}) 10:33:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$addseals(r0, 0x409, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@broadcast, @loopback, r1}, 0xfffffffffffffdda) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e00000027f00000140000000010000007f795401"], 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000200)={@multicast2, @loopback, @broadcast=0x7f000001}, 0xc) [ 1080.631111][T12452] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1080.704298][T12452] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}) [ 1080.751649][T12452] Error parsing options; rc = [-22] 10:33:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) write$apparmor_current(r1, &(0x7f0000000180)=@profile={'stack ', '\x00'}, 0x7) lseek(r1, 0x0, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2200, 0x0) 10:33:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:56 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/sctp\x00') ioctl$TCXONC(r0, 0x540a, 0x909a) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x80006011, r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') openat$cgroup(r4, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000014}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r5, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000004c0)="9d1a88cf72662c551ecb230bc678b2ad0d305d10bed55c558aff41ae0a9343c3c79d1436396d29a955221123b21af322642f06e85568e2c15042af5b207ec0dacdabd9af7e605377713b54fba75545b20f4d170cd03585ed87c45bfef97a7c3abac6e2bd3732f3167706583277ea96dff2ea7cb6f0fb7bbc968e6653d078eb07bdec97cbe43275923a7c2f4cef781fc2b5cbc91d6de889b833356b5aa6ee23c14feffb1bc65adc9226c94c1cf2286efd285020d7", 0xb4) ioctl$KVM_GET_IRQCHIP(r7, 0xc208ae62, &(0x7f0000000380)) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) 10:33:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:56 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e21, 0x10000, 0x4e22, 0x80000001, 0xa, 0x80, 0xa0, 0xff, r1, r2}, {0x5, 0xaa1, 0x7fff, 0x8, 0x81, 0x400, 0x0, 0x6}, {0x0, 0x1000, 0x6, 0x4}, 0x6, 0x6e6bba, 0x2, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d5, 0x2b}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x3503, 0x1, 0x0, 0x3, 0xcebe, 0x100000000, 0x5}}, 0xe8) fcntl$setlease(r0, 0x400, 0x2) unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x201, 0x0) openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_load_balance\x00', 0x2, 0x0) wait4(r3, 0x0, 0xfffffffffffffffe, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}) 10:33:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1081.219958][T12590] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1081.296818][T12590] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1081.369668][ T26] audit: type=1800 audit(1560854037.248:93): pid=12598 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17137 res=0 [ 1081.408345][T12590] Error parsing options; rc = [-22] 10:33:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000005280)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000740)=""/24, 0x18}], 0x1}}], 0x1, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000100)={0x75e, 0x401, 0x2, 0x2, 0x9, 0x3}) 10:33:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1081.425602][ T26] audit: type=1800 audit(1560854037.278:94): pid=12583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17137 res=0 10:33:57 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x22) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x2ee, &(0x7f0000000680)={0x0, 0xffffffffffffff0c}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$setopts(0x4206, r1, 0x4, 0x19) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'tunl0\x00', @ifru_flags}) 10:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}) 10:33:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:57 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x111001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f00000005c0)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x2004, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x4e137614ea6e0671}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@uid_lt={'uid<', r3}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}]}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) wait4(0x0, 0x0, 0x0, 0x0) gettid() r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000040)={0x1, 0x5, 0x80000001}) statx(r0, &(0x7f0000000780)='./file0\x00', 0x6500, 0x603, &(0x7f00000007c0)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f0000000740)=0x10000) 10:33:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) getsockopt$inet_opts(r1, 0x6, 0x24, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 10:33:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}) 10:33:57 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@generic={0x3, 0xffffffffffffff7f, 0x20}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000380)) ioctl$sock_SIOCETHTOOL(r1, 0x89f3, &(0x7f0000000340)={'teql0\x00', 0x0}) [ 1081.897816][T12739] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1082.008196][T12739] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0xfffffffffffffec5}}], 0x1, 0x0, 0x0) getpgid(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') preadv(r0, &(0x7f00000017c0), 0x1aa, 0x0) [ 1082.109583][T12753] QAT: Invalid ioctl [ 1082.129146][T12739] Error parsing options; rc = [-22] [ 1082.147264][T12753] QAT: Invalid ioctl 10:33:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}) [ 1082.173680][T12753] QAT: Invalid ioctl [ 1082.201458][T12768] QAT: Invalid ioctl 10:33:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:58 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x141000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x191f79f7, 0x10000, 0xf4c, 'queue1\x00', 0xff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x404010) 10:33:58 executing program 3: unshare(0x40600) utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x9, 0x1}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) wait4(r0, &(0x7f0000000080), 0x3, &(0x7f0000000180)) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='com.apple.system.Security\x00') 10:33:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x7f\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:58 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(r0, 0x0, 0xa, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8001, 0x1c1000) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a8000000000000000500000000000000030000000000000000800000000000000b000000ff0000002f6465762f6c6f6f70230000000000000200000000000000040000000000000005000000040000007369743000000000050000000000000030000000000000000b000000020000002f6465762f6c6f6f702300000000000000000000000000008000000000000000100000006238000001005e70726f636d696d655f74797065"], 0xa8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x1f4, 0x0, 0xffffffffffffff71) 10:33:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}) 10:33:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f000000a580)='./file0\x00', 0xfffffffffffffffe, 0xc9, 0x0, 0x404, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x100c0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "130615dfa9d67999afd08c118f65784f64c28ade"}, 0x15, 0x3) [ 1082.556216][T12880] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1082.623762][T12880] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:33:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x01\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1082.789319][T12880] Error parsing options; rc = [-22] 10:33:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2000000000002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xd89) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)=0xfffffffffffffffa, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'rose0\x00', 0x4000000000002000}) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0xfffffffffffffff7, 0x8, 0xf678, 0x0, 0x7, 0x200, 0x1, 0x0, 0x4, 0x1, 0xfff, 0x0, 0x100000001, 0x2, 0x5, 0x4, 0x1f, 0x6, 0xee6c, 0x100000001, 0x8, 0x44f1, 0x4, 0x6, 0x3ff, 0x8, 0x60f8, 0x7803, 0x1, 0x81, 0x86, 0x1, 0x400f480a, 0x1ff, 0x990, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x4000, 0x3f, 0x0, 0x7, 0x8, 0x4, 0x6}, r3, 0x0, r2, 0xb) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8, 0x8}, 0xc) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x6cff, 0x8, 0x0, 0x0, 0x80000000, 0xfffffffffffffffc, 0x7, 0x0, 0x0, 0x5, 0xa0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x79f7bf0a, 0x0, 0x0, 0x0, 0x81, 0x9d8}, r3, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2000000000000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000040)="8dbaac5a2740d1", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x890c, 0x730020) 10:33:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}) 10:33:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:58 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0xfff, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x100000000, 0x410000) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x5, "404e8d34b812ed080c529e0335e799f90e2b70f90052aa9cb490681dddde2e8c", 0x0, 0x10000, 0x7, 0xffffff}) 10:33:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00`\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}) [ 1083.155039][T13016] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1083.215110][T13016] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1083.278586][T13016] Error parsing options; rc = [-22] 10:33:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfffffffffffffefc) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000000120081aee4050cecff00fa108b5bdb4cb904e473730e55cff26d1b0e002e800c3800815e510befccd700f4bd0102a98335b3b1c7bba5317acdec15bae8b3075809a382a5eab26a1bdf145984a53a4fa8075569cf7e739fa623a1dfd1fd711534f432fc6ef0b6ff", 0x2e}], 0x1, 0x0, 0x1eb}, 0x0) 10:33:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r4, &(0x7f0000000a40)=ANY=[@ANYBLOB="2321202e2f66696c6521283c63300a34f9734acde90647902722b4207be3c7fb91f1f7263dbe89308f0779010058f9ee77ff2e4f2180f6ce21454f1d9de6a401c2edbf280a7f61a7e4666bcbd436244824c9946154547b2bb12f5b0811c3a186da03d6e79e828d2e27e5681312d06ab15107f958c44e53963a68ba3844c98746b2dc98f6eefad1c145f2dca787004e6fa11f5b954ca1be360289dd9c516f0b77605fbac0a1e2d9a6af826fb13179c7"], 0xaf) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f00000005c0)) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x8000000000044000) getsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000200), &(0x7f00000002c0)=0x4) io_setup(0x0, &(0x7f0000000240)=0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000680)) io_submit(r7, 0x0, &(0x7f0000000540)) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$LOOP_CLR_FD(r1, 0x4c01) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000780)) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@remote, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) 10:33:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}) 10:33:59 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x80000001, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000440)={{0x2, @addr=0x7f}, "5acd27491fea9006e8f33d518ddb8d77b32f3238ae7dc751f37f39f230cce6fd", 0x2}) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet_tcp_buf(r2, 0x6, 0x3d, &(0x7f0000000280)=""/18, &(0x7f00000002c0)=0x12) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') wait4(r0, &(0x7f0000000200), 0x1000003, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8a00, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:33:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:33:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1083.666803][T13143] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:33:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1083.713909][T13143] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1083.741210][T13143] Error parsing options; rc = [-22] 10:33:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}}) 10:33:59 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) 10:33:59 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80180, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:33:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:33:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}}) [ 1084.126954][T13274] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1084.200497][T13274] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1084.250184][T13274] Error parsing options; rc = [-22] 10:34:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = fcntl$getown(r0, 0x9) process_vm_writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000080)=""/24, 0x18}], 0x2, &(0x7f0000000640)=[{&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/153, 0x99}, {&(0x7f0000000240)=""/241, 0xf1}, {&(0x7f0000000340)=""/14, 0xe}, {&(0x7f0000000380)=""/141, 0x8d}, {&(0x7f0000000440)=""/238, 0xee}, {&(0x7f0000000540)=""/208, 0xd0}], 0x7, 0x0) setpriority(0x3, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000700)="40d3cba877e877d6a038adca10cd528b1f99fbbdfe3d7e7a83e449a181754117ca352d36b36f76b8b0f9851f4de296afa052e079a82c5701e6ccae875596cb247e7575089f33c69f15ce5a94d8287778da62cc652f1fd3a68d577a4c7e08b8d1aa251a3e6bfeceaff226d30925bb7220eaab6ead3bc8c859bee8e6d454813634d52638c06145adae05be0ea37f46db4e6f38c0c9ca3529b1130d9d45b543c7cc56e40e") [ 1084.563561][ T26] audit: type=1804 audit(1560854040.438:95): pid=13144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir675103425/syzkaller.TEl2We/1802/bus" dev="sda1" ino=17399 res=1 10:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}}) 10:34:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) connect$tipc(r1, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x9) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000000)=0x5) 10:34:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:00 executing program 3: unshare(0x40600) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x28000000000000, 0x402000) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x1c, 0x16, 0x5, 0x1b, 0x9, 0x7, 0x3, 0xb4}}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1084.688924][T13400] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1084.771438][T13400] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}) 10:34:00 executing program 1: syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0xf87, 0x8, &(0x7f0000001680)=[{&(0x7f0000000200)="7d03eee8df4e3bc0c8826a1cbaead27c9803c3b1ea2e06ee3299ba0be5cb9e35be93120b61659eaa6ad5b3c3c42393a10f46fcea6f9db5d3f66d7bc22e97d6b461d004f7f12eb185be5a80e7556a2cd0d2b3a4e2d93a468c735895fc1263b8675b7588166326f730ea5d8c1fb6f14ed022fb66c1c45d8d0db8c58d45016bd83d10bb33efba6968fecda71a67f59108715e93bea7659f271313519b5e600385d8e75733fca71422e93298e822fb96dc1f90fbe3f56a124c097929ac9f4f58de2a10b08d176b8ff4da9030eca76ec91dd0d11e43d1d5c2084a5bc31228a7c6c578736a5a6ba7197155584f409f194dbdc1fd319983e6457012bd23ab5054507f444e2af7c3647249544a5428b990eb317ae5d6d2eba90af96721cadea99c1781496e6bf694f327463fe47c548881f9c71f5bbbbe40f71ad6c8e555958296c628be3e9d08770638d3cd88ea1bb84026e8198126299ce87dbb64eab84e4edf8d1bb1f5081ba7fa815a9169ebe20c96c03ea91bec84a8e0f172301fa1985d36c9a32f63af7829b36c608ffa078f189dafa464e0518efe973152e0d46ddfc731055e5afd7e2dba6564dca68d9635e5ffe179c7efb18c60335a8399a1e2916d42497872ce304ec36e123fa30b60f65b26a4efa94f8e2502200ac2bb79a5ff473c46f29548ac80103705e1dcf1e91a8c7426cf7d4a1e9075aa121840044a7513a83e082fe2e7dc0831220e386b7b0b9124a8d2b57923502f83c6b7f7025012375c10320cc8540f93b4743f221834d87cee515b4915c44f052db04eac02e29c593b4abb6f807117f0aaf4f9519cbb0f36314e03c25088b316ffd1a483cfa3a679b23365651c6f0e09ea233d83e654d40939b109b4b5b8b905d501708d2b23f6c8d734f5fc3d2df7e50e7e9bdc05d2655d80ca6bb3755f9ae8c6683f57fd75cabeaf74630535e549802d48b7113a545534325ed6310ea26006f4acf14fff22934848b848d43d78c7f0862b8a6ef62e02485f911a9a6e35f11221fc20f76998a6f7c6ffe20064827de06c89088f62930df4d844b850280753e6af5f18f52d8d477a90fafeb6d57d1a3789ccfc4ad8ec6d71a9855e982bc5dd471a7d2b8762181b5bea02d3e266073bbbbf78a04728eff880007ae0032a0c26e455bdbf9be52a5d8043b3cacfb37030f61e9e05a7fb4381b5a6f80cb8a019f4fe361b07b774480c6487b09351ed474c17884926eed7f75c3765e3ad4a3bee5bb813e38b5f4ec5fd7020bbfb781fac4dac2d1c41540a7fac78c19e5451b7fb6eef00e54780329a55fb23a889a9517ed7a1209a36c741182e0ae5978de42c5f8132fee8ada1c988a234c24d10cc392a495b884f3d5a3be22e2908876263c0c121a7e1f85baa108f8c381102c07d4ae75ea57f828c1afef9b043a76a64c352f3801512be69ddfd415b3ffa369fb5cf55c1b94b8c06a58c6372475b09c1ed6862dd4e910d659e2d6a5ab0bb22f72dc87a884b59592136e8597441ffd9ac22708c0a5bc682331aed283634c7f20f29afab1d5dea3699b084ffb7d2a6123114ed44e6da0937de09f271572af4af28eea07d2125204554733380d9310d59660c753e77d0de3f40293fea2eb94797ef769f4b81102d5306a3942641ecc27c04103c6eb17a5c7cc94337a7d8e7c27d0dd4c2ceec19e4fa36e43c41d1864a276bd9320495d672c41d056be892e03e4afdaa543b686b553c6c94f69d92dce6cc01c685f32f1f5df9dc687e32ab065efe839f91b7a72f267cd5617c75ec0d027db636dce4cf250ebfd98990c9b760b80b7099a89b74ae5dcacfa33153768d9ed067ae58305cb6653cdc06c81fabbaffa4defe66305264791c7b5ccd2fb2b941d5bc6662ba8da9487a518acf8e503a40e2da10a4ee6c76e4cf1296aefb1c0e78804338300392ccbd022cc63dcc7a47cda4c90792087b70a60582b7f65fe301af524754b37dc43ca34cccb78c4edbc334e03bcc13b1f936487e876918376b2f34279b1a83c52fd6cdeceeebcef2a784a08c4bb8816d65d0196123c487b95d7fe0cf36aeeeb7cd2334ebb1ab2c49a55837dd7959207f1c1d1f98b3f5fcc81ff7c3ec943898aff47c4fe19cba59f30eb397e1442073d2a05c3b9e4de7e82baa6ca5b2503b9bffa6a7146dfd07fbd27110b58c2607b5b485f0bf44861ba1bed49cf846ef9df829cd72960b6c992cd48739daaf9da1d8a18ce505a29717e8f749b44161089fc087d8335dd5c68beb5968c3bc0252064dc05f0c2bd49450837fd2f8a5a4a52c0425037f354dac10d8093a17451836138ef1bcde59c3a8b829af13d6518f9232696f560d7d0ca4af2150109e23a78010ce3cc91e96c483b510008fdb9de002ac591d0cc0b87c9875914e6b332243504bc6a0231a0d669c72eb85c54d97d1a138fc67476f07f86b1536dee3512e08bdd62b10dced68895fe42b057ab3b19de9ee97974ffa5d60c1f2e02b82668fb36234831ac021cf558531e09be0d02f9cf1818f244dfcd904e2848ec1136deab386130a87188ba14b513a49cc59bb382165590c4a8af8b4dd49f204339e12e7f5f044d8609523ae029f6236beb06d05dc75229407c1e9dee20b164993fea7b3c501995667b7feb032364301d8666b4072382feb1de66ecb055d25193be08a03153e4dc878d3614905f1de634e96d9e8adc68e43eaa7221b35c970d7d569137a2f8ef862bbd4d029f96871dfd30a5173df0de2cb5be61198e74e5243613ad0bd77f0a69ac594f18fca124770ae5de4b4657b814e586de11c392dda3f65cd92f261d9334178d7ee7489af627519df92a4765c7153f04c80393540eb3206c9ae93ed6afd9f91ce9878e5c9d9294b5ab68e2acee5f9b3f18d0dbe415323871f805d7b5473eef5f4665efcc9693eeb40f33c206175cad7aa4d7653f67e83ef259098b17a86d92868aa9068d346bb232b62fe7b2d88f3ccdde4044abdf8564571484e49fde8f53464fc882cc9f341f400a35904009c99fd0ecc6cad3a321672e81cf7677aeee3710da6b25221ffe3edd8d8d1f3b3377795ea6a6cb59e1db2ea877188854e9e30cfd0adc5b34cb268218aab7583ce4e803bee31a6f08553ca4797c653c5e65ba32a6711e62d37d2d21659df7563a4f5cc9e44ca3f3cdaea50abc5a2fcea7909720b36c6a4c4f25789523b1e21849342a3978554fa1839d1b385b8023a24872bad1d0fe344bdea51ebc2e2668f959ac31bac518615115a5b28957f7cf9de7594851dcdfff4aa312cd9e8d5b752ffb451da3664fc5fca12ff48213d6ffcfaf68d85a7c413d6d5372183fea2d62e82a0111d2823c50a515ab3713d8aba1561b0b1a3b4eeac3a8a7c9d933616a1e440cb8d0d42313d016bb157b55562ea56df170b24b288b017bee783fe6f2e203d5cc187396e69c183fb45253382ffbfcdc1378b970cb9996d0b18d5dc63588d4efda7e3a6f1b9ae8fd0c9964666c83d70761d25b5373a9f64dc34862b31b3d8398cf5d178899933174452500db2a15df5b3b16c6d9fff8ed0301a3d39e784ad4fc379bcf41a2d51fb6e35ca2cf366b64daf7df6fd7768af4d628a18a5bdd72be247075286932ea8ca930f2eb22692a0de803c3589b09de1512758cb09857a33e2755fc4ecf2feea3921847092a77bc8182b32f5c9b225d9850f2c881927b4e2e6596c4a7dd227fe4817c16a284cad35c4988040a2ecc19baad42b84ffccf418e4e446a9659441fb6a7bdd9f25b3b6731d38b3ba8202a9903acad5ef43f6489e0ab855e2e2ceffff040d3c6b7323ffc7d2b8e29aafa118f92a564200495ee4fe3bfa4a2b5875f1bee42a046e1a4eaca7d74be69c170bee41da59c40b8b460921417112b623c403a64c9e0f4af9144daa40b47bd84285304b853844363ee58a7250a8ea2902580a6b436f4dcd28c1580c329d61aa8cc4c8f20448219eebb69edb391bfefd31eca90ea0d3b654603c842af1c8a3aa7deda515d50265e2440c060704827509d3ce7add1d2c12a976cf27771d5b7fd2d023b9a3af2b790ec2cec59d4cac6dd68d4f061ff2bfe0df0dd22aee066d8419678db56cbb3368ad2c0bb33ccb5f5c9becf472d6ad0530531a7e48eef75a78ccc7339436a69ca8b788fb6b0872d18a8ef0e6fe085b4cca1d10806545990145da8aa7e2d6d53c2fc06915fa2e4972c900c3d267234b840ab43ed319fa5febaceddf46212b4860c897a531ef90e8a2d8f4df4948efad8bb17960ed306001597c3668ac751a6534220db928358b07013cb446ab47b347ca5e77b93da5573387348235bbf177775b452a31814fa60ada81089b467357c3cedf6705b3f40f515641b3346b8b0eebd459e2851415beb6e69a1b341620bd5928527394e56afcbbb5efe2a8d25c4b0d386a4c90fa7c763a971873edfe75b512e5f5a5012885124ccaa26b4ef6ff54827cd7859de5fd0d360ec00aad963580ffcb611bd3bfab91bc0894e64b8ad6c4fe06d039d894b12b63571f64bfc51ecd582b0c3b5e03c38333a5c7544015c0841787d4e445c4624c9e054bc3adb2a52aed96a6570c174bbfc7c9b26cec846e11f87609098033ecfedea695128221428ca72600ee4b5ba40dc99b5c5af688da83ba827af470a98c3a18563b5e0568ab7928a1a09531b9ef0743ea9ceb565fa5710a89cba7d69d3ce0527db28df72779d5a17bca5f78dd2826f2f17799138a884eb188da6aad0fd43580640d64783712d8acfa1f53f6d3be557331bfdda16461a6f59d5f91591f57baa5a5def13ab33ea0ba5b05920ee907af149c41a538b5f17afd3383e05ca004bf2e4bc7d458f705a02738d038c2210fefd6d9b83df853ab0a8265ada628dac7af14321168b4c667f3f010b04608ff0bcf87e22aef887868cdf8d139cf0924a01030a17b54a44735b243f867e2b66fb369ba231fb250631e615d5643d363c053171f23659e615f5a1c1628c92387c921e45857725c461657e8284fdd88e9b66417de53294d41f59135cf84a08b75d5ee253c5d31c506e73e81b557610aab2ce839790dea5fbebd83f0f6153e0a7aef989ccbff6b92d31953c2366a136f90686d10c8cae556e25c7935da62023b58de6fd58efc9b7610ed52770dcf08d97b2b5ec557afe60689e818a871541518cefe768b42d92814ac2c2ab5fcff8536135d90118995a4ddebab0db548dd9a889450b056156ffffb3fe405f074811a564cd8e0c6d670f4ed5319100533d5d9428b92d682650314ba3b1112752c5a5d4141857646669f5617eefd2d7ab2ee773bf88f36eddad20cc94ba39cb72e1b7e05c7b47ce9777a2ecd4985e31e2cbf7217920e511020b30ab12937245823e761a2b838f5853b78bb322164e3af13348a3c8cad3a98bda6a76a63017aa8bda469e550d8228d2b8721de78ab122b175caf6e21f6ecaf032b79d7e42dce7b67ff1ebf3d67ed77426011eeb316a5fae836585ecb357536ac2525dcdfbddf34b7555772e4e419872bca5ba1debc677a18ad653a936a33a1b0f39b3c652e5a23323dfbecb60bdec909f5671f3c2602cc30c65ffd133c838202002eb76773fabf3d22484897688630ba23d4773351bcb2eb94d411290b2d53f8954d9652b5c006a393663261e34c7b2844f54f6d79b2ccd031ed6b2a48348be2a8448ecddf772bae36ced3dcfc4e6538a1a764c15043c4f0fe534026d7a352c230b72620f4906684d9659af25abe6642321cbf77912b1469d32d6aa2c4087c67666743aa8a31dc804d0494602cbd6a3938fa4bb198b3bda124871f550341dcb14b3a71", 0x1000, 0x7}, {&(0x7f0000000180)="122e750e0bd368cadb373e4ae5a33023a5885f4b46ceb5bc58040afece49c6be41152f4d548ad67367d170f2afb858", 0x2f, 0xffff}, {&(0x7f0000001200)="61891c3d1dd27ab710677ba4adae9b535af9e81f5038704776db4fa7aac974873a398fe938364436f065814c4c4de7571113e1a8d421405da027073e142d5699e46585c9c981f46d503d88d08502de9cd77f6a5d315ab8ab3530d86f8f555059a27c982faecc566801c9bb59be2186862f3adb95bf0849be62238c5264d5389de648c640b8450b55a019079d7ac3b71e", 0x90, 0x100000000}, {&(0x7f00000012c0)="2cc8dd246a57ec57d08906576fc7146ef0180a6f1bbe7e5640d804e4caf788fc23971a983d460245ef4d50e2d91f294fd3d2edb957df1983f725b5392ef473c22180862ebfdd1af4125b976ecc05d3dcde7ee487be8ae7debce8b91203d4024aef50c70bfa3240d6694b19af54223d30a46a6136dc073b080d9b48557a81e9d807542aa7d928723787c8648650562f85ddc9c6ea0ada623a51de89d16e8fa20126dab8f97273c436cef215602979b24284408f6adf89f778a1cd00e177e72e01ba702981789e1b0106d98e906e55a461400fa17884bc7095c97e6560752c537b3d4d3d5bbf4f3eeea3349ad2e2519156cb", 0xf1, 0x9}, {&(0x7f00000013c0)="3805792c4d1a1c7fab475a960f114e70c000379d57a28f7dd4794405685fa75ad08256d7885c333fb625a4ed17604c4b36b803b21a99cb64f872fd533ae4abc396331140e12d6050267725b0ea0e063978888b3913948e651de0e7c860db9c91853d700142fa7075a0e7fa4ced26ce9168eec53a6007696377acbb0143f57ef26f1d09bad4db419334e647128217797c9f1a0bcbb1aa94174e1560fe10a303aa76d2ae07b774fcb8e42910959fc73367454fadd3972dd0b830742e42cfe5da95a7c1a2ceb80946fa168f9575c76feb8095", 0xd1, 0x10000}, {&(0x7f00000014c0)="1dd81cccf814ea252ac601b6cb80b1e8b96aed0bf7a924b2b79ca4ab1db9fd8a998b43176151cf4b08bc1240f1b95e09beea63218e145601cffb20ba6a59077ccc5d75abe8cddb1d31915503d7c05544089956c10123f30031232df05dfcfa", 0x5f, 0x3}, {&(0x7f0000001540)="27cb770cfcd9fceff14ad6d38bd7cbf38ad6ec574c36cd7958c4f1e9670819466a724dc6962f85bb2efa0451204d326d1b8c94dfc85668608eab56160a6b7c0f6a6dd28f32e9038dfb9245f847463b6d3fbfffe2d9fe2a156521a09ef29b9a70a254543abf246db598d4431fdb2a9815050d407a0d8a50db36c8b0cf1f86a5ef50ff62b1a79a", 0x86, 0x6}, {&(0x7f0000001600)="10bb44e1c171f6f0f63aeb6577c5727c0277f81bde3365544507feeaa707f7008e037fdd4eac7a1d313ba94a77d2c4454f464888ad83262b47ac4494b5830bfe074d3044e5ac3135c58376f9ed749d735a9a30e257e346e24fbb25ca30fd45fb90adefa669aea0e7fa6518d0f7bc8d56c757caa258", 0x75, 0xa00000000}], 0x80, &(0x7f0000001740)='\'vboxnet0{-wlan0[%)mime_type)&user\xb0)ppp0\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@delsa={0x3c, 0x11, 0x101, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14}]}, 0x3c}, 0x8}, 0x0) [ 1084.898390][T13400] Error parsing options; rc = [-22] 10:34:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:00 executing program 2: r0 = inotify_init() r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) close(r0) close(r0) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/46, 0x2e}], 0x1, 0x4000) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0xffffffffffffff7f}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000200)={r2, 0x1, 0x3}, 0x8) 10:34:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:00 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="a9b629346ede047e98d5e2feace2c443b27a44caf81d73bce1543f1362119b42ad1f553f0fde548b594d682c", 0x2c, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="176d4c6f0cdd5992e3deb2bb5dbbc0885758c671776662d7e3ce50e1323e331fb0869cd97135dfcca76a603eac58878c2d416c393f7f48e26a53c286eadf30ecb0d20233f0633ae11e415b649ab4eb0ebce8066d93f2cbeaf91ff27dbd357c88b627e125bf37c64c6eb631213dc322e1301c270044204b80679a317518f1d7e3e412ff2b6db13355f6c197474475f953c0a2987339ccc31fb89fc1afe77561a01f567e567907723954ecd9d94bfc8cf9af57f3da3fc3833acec1d65522894da611aa7aa89330dc153823d19ee24f7e842c33e647f2eee19a814f9d16a98795552193904309112e168bfc2a644c7a432ef6e3beca", 0xf4, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000180)='.request_key_auth\x00', &(0x7f0000000440)=@keyring={'key_or_keyring:', r2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}}) 10:34:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000080)="11dca5055e0bcfec7be070") syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x4002) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x85e, 0x204401) 10:34:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1085.295495][T13537] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1085.355545][T13537] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="04137597ee914a723520a21a37b31c3a17"], 0x11, 0x1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap$binder(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000280)) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, 0x0, &(0x7f0000000380)) mmap$binder(&(0x7f0000014000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) prctl$PR_MCE_KILL_GET(0x22) socket$bt_bnep(0x1f, 0x3, 0x4) [ 1085.469550][T13537] Error parsing options; rc = [-22] 10:34:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}}) 10:34:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:01 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r1 = fcntl$getown(0xffffffffffffffff, 0x9) write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0x12) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4c9]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x8, 0x4) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @rand_addr=0x3}, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @broadcast}, 0x100, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000140)='veth0_to_hsr\x00', 0xfffffffffffffff9, 0x3945947, 0x401}) 10:34:01 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 10:34:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1086.013123][T13675] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff00000000}}) [ 1086.076816][T13675] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x38, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/172, 0xac}], 0x3, &(0x7f0000000380)=""/133, 0x85}, 0x10002) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000480)={r1, 0x1, 0x6, @link_local}, 0x10) preadv(r0, &(0x7f00000003c0), 0x3eb, 0x0) [ 1086.168958][T13675] Error parsing options; rc = [-22] 10:34:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xa0\x01', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}}) 10:34:02 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = getpid() rt_sigqueueinfo(r0, 0xa, &(0x7f0000000100)={0x16, 0x5, 0xffffffff}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', &(0x7f00000001c0)=""/183, 0xb7) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:02 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200200, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x10000, 0x4}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0x8) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000240)={0x10, 0x20, &(0x7f0000000140)="00ed37e47c44a9a67636de27e2c66ecc09b3bb57d79466397471e7edc8fc9e4e5af6928365bdb4a2768e549b2a84089c7caea8f75e34fc484f1a66e7da5f73649527aa1b2c16d33c0281d3ba26e0c25da02b53a528e3b54c26021b6edec56883bde9881f21f6ddb59200d573b9950af20568965145f58f83273e7cd6d61606c1eca5c6dafcfedd514b88c000b040f951dff4a86620598e7b4757ee48e4024cbe392dbc7408c176e797fa62382b9fc5c07b95af3440a495c5fd4e4f1338809f7f0ce84a9e80b6976b573cb66d211c34b6ea61834c00f5fec04335d71a29fda8566eac3c7127c1abe946eadf62", {0x7, 0x7fffffff, 0xf77d5f5b, 0x0, 0x7, 0x0, 0xb, 0x80}}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000), 0x0) uname(0x0) 10:34:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) getsockopt$inet_opts(r0, 0x0, 0x7, 0x0, &(0x7f000021affc)) 10:34:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}) 10:34:02 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r0}) 10:34:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ce43e4aa", 0x4) sendmsg$sock(r1, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x80d5) poll(&(0x7f00000001c0)=[{r1}], 0x1, 0x7) 10:34:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x98, 0x33, 0x109, 0x0, 0x0, {0x2001}, [@generic="ffd38d9b", @generic="0c50ff05c8ff23f4ddc2bdf58d10cfade38354f7783366a741e6019e3e0b572fb2eb9b032196910e99f8912f69f70d0b07ddde7e3f7a1cc625ec3f47d5cb7156a9e694a78da94d17ddb3a7147f743994c73f408646f42497530ab8849ad1bdf12ee5d8aae755d7d9dddd8d9c18471e0972fd827bb0a66cacbc9ef982b1bc41"]}, 0x98}}, 0x0) [ 1087.033355][T13830] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}}) [ 1087.138844][T13830] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1087.209088][T13830] Error parsing options; rc = [-22] [ 1087.274430][T13854] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.1'. 10:34:03 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x40000000) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x9, 0x200, 0x7, 0x840, 0x3, 0x9}}, 0x8) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) fsetxattr(r1, &(0x7f0000000140)=@known='trusted.overlay.upper\x00', &(0x7f0000000180)='posix_acl_accessself\x00', 0x15, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) write$P9_RLOCK(r2, &(0x7f0000000240)={0x8, 0x35, 0x1, 0x1}, 0x8) [ 1087.336684][T13854] openvswitch: netlink: Flow key attr not present in new flow. 10:34:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}) 10:34:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f00000000c0)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x2, 0x62, 0x0) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @empty, @broadcast}, &(0x7f0000000080)=0xc) 10:34:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xa0\x01\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:03 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) wait4(r0, &(0x7f0000000040), 0x1, &(0x7f0000000100)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e21, 0x30800000, @mcast1}}, 0x5, 0xf0d, 0x4, 0xffffffffffffffff, 0x5}, &(0x7f0000000380)=0x98) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200080, 0x0) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000140)="829f4b575a119154379c9a6aa5f239bee0c7527fbc1baaf74dd5006db82cc1c422f99ee9cf3c4f92253ae51460e6a618f9718b6d36ddce113596fa9a88e7958d") inotify_add_watch(r3, &(0x7f0000000080)='./file0\x00', 0x1000a00) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f87fdd7c27ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) 10:34:03 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) sendmsg$nl_xfrm(r1, &(0x7f0000000ac0)={&(0x7f0000000080), 0xc, &(0x7f0000000a80)={0x0}}, 0x0) 10:34:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x0f', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1087.783040][T13974] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1087.807949][T13977] tls_set_device_offload: netdev not found [ 1087.850049][T13974] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1087.884518][T13984] tls_set_device_offload: netdev not found [ 1087.918998][T13974] Error parsing options; rc = [-22] 10:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x601, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0xa3, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:34:03 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x2d}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x180, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000140)={0x364, r2, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x60000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x401, @loopback, 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x80, @rand_addr="318fe78085eda5edef1b1351cc9529c3", 0x7}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xee}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffaa69}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfae}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e628c14}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x42614aec}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffe0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x1}, 0x40) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000080)={0x7}) 10:34:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00?', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:04 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x83) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000100), 0x4) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:dri_device_t:s0\x00', 0x22, 0x3) rmdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 10:34:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1088.490790][T14115] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1088.509076][T14115] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1088.567789][T14115] Error parsing options; rc = [-22] 10:34:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1088.592472][T14126] fat__get_entry: 30 callbacks suppressed [ 1088.592485][T14126] FAT-fs (loop2): Directory bread(block 112) failed [ 1088.696636][T14126] FAT-fs (loop2): Directory bread(block 113) failed [ 1088.731141][T14126] FAT-fs (loop2): Directory bread(block 114) failed 10:34:04 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @netrom, @bcast, @remote, @bcast, @rose, @default]}, &(0x7f0000000000)=0x48, 0x80800) socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, 0x0, r1, &(0x7f0000000040), 0x3fffffffffff, 0x0) 10:34:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1088.767447][T14126] FAT-fs (loop2): Directory bread(block 115) failed [ 1088.793353][T14126] FAT-fs (loop2): Directory bread(block 116) failed 10:34:04 executing program 3: unshare(0x40600) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x501) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0xc) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1088.817793][T14126] FAT-fs (loop2): Directory bread(block 117) failed [ 1088.848827][T14126] FAT-fs (loop2): Directory bread(block 118) failed 10:34:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1088.888507][T14126] FAT-fs (loop2): Directory bread(block 119) failed 10:34:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1088.960302][T14126] FAT-fs (loop2): Directory bread(block 120) failed 10:34:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@empty}}, {{@in6}}}, &(0x7f0000000000)=0xe8) sendto$inet6(r0, &(0x7f0000000140)="c138e39e143c363a279f36bd3d833a95649e6771a7d0c766b6462a9d000000008265b29dec31b65c07d3bf15e0ea5ebefe399975cac2f99b2ca3c5d4e426a3cead7a5030a9", 0x45, 0x2000c000, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000380)="b4", 0x1, 0x0, 0x0, 0x0) [ 1089.018952][T14126] FAT-fs (loop2): Directory bread(block 121) failed [ 1089.068217][T14250] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00?\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:dri_device_t:s0\x00', 0x22, 0x3) rmdir(&(0x7f0000000040)='./file0\x00') openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) [ 1089.158222][T14250] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1089.226072][T14250] Error parsing options; rc = [-22] 10:34:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:05 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) fsetxattr$security_smack_transmute(r1, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000340)="11dca5055e0bcfec7be070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4, 0x7}}, {0x8}}}]}}]}, 0x5c}}, 0x0) [ 1089.587472][T14479] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1089.660104][T14479] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1089.723827][T14479] Error parsing options; rc = [-22] [ 1089.748534][T14489] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 1089.821870][T14563] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 10:34:05 executing program 1: socket$pppoe(0x18, 0x1, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "3b98a01c99d8aaf6ed85ed9f3448acffaddf99ab"}, 0x15, 0x3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x100000001) 10:34:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:05 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x7, 0x210000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x384, 0x3, 0x2, 0x3}) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) io_uring_setup(0x8b3, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x3, 0x318}) 10:34:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0xe080, 0x0) connect$llc(r1, &(0x7f0000000140)={0x1a, 0x318, 0x100000000, 0xe35, 0x7, 0x20, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x64c) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000180)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2000000002, 0x0) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@null, @null, 0x7, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) 10:34:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xf0\x89', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff`\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1090.180429][T14611] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1090.249296][T14611] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1090.280119][T14619] QAT: Invalid ioctl 10:34:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180200000000000000000000008520472a27bf77b95efffc57821d70fc317184d656ca9db287d9dac700a72b9d9b742b085aa6cad848c31917dda34f332c42a5813f093f25a75cb481b19cc973"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0}, 0x28) [ 1090.294192][T14611] Error parsing options; rc = [-22] [ 1090.334874][T14629] QAT: Invalid ioctl 10:34:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x89\xf0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:06 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x80) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x8) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) getsockopt$bt_hci(r2, 0x65, 0xfffffffffffffffd, 0x0, &(0x7f0000000080)) 10:34:06 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)={r2, r3}) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:06 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1) r1 = syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000040)=""/164) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'gre0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 1090.719428][T14747] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1090.771571][T14747] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1090.798291][T14747] Error parsing options; rc = [-22] 10:34:06 executing program 1: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) 10:34:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:06 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00v\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x40400) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0x2, 0x7}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0xc0000102, 0x80ffff00000000], [0xc1]}) [ 1091.174188][T14882] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:07 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@dev={0xfe, 0x80, [], 0x1f}, @in6=@empty, 0x4e23, 0x200, 0x4e21, 0x1, 0x0, 0xa0, 0x20, 0x89, r1, r2}, {0x80000000, 0x96e, 0x38c, 0x1e681aa6, 0x3000000000000, 0x3d87117f, 0x204000000000000, 0x3f}, {0x3, 0xb98, 0x8, 0x2}, 0x7, 0x6e6bb9, 0x1, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x25}, 0x4d2, 0x7c}, 0x2, @in=@loopback, 0x0, 0x6, 0x2, 0x4, 0x80000000, 0x6, 0x9}}, 0xe8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) accept(r0, 0x0, 0x0) [ 1091.222693][T14882] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1091.333744][T14882] Error parsing options; rc = [-22] 10:34:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7, &(0x7f00000000c0)=@raw=[@exit, @jmp={0x5, 0x7fff, 0x7, 0x0, 0xf, 0x40, 0x9}, @alu={0x0, 0x69, 0xd, 0x7, 0x3, 0x46, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, @map={0x18, 0x7, 0x1, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x3b53d65f, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0xd, 0xffffffffffffff9c, 0x8, &(0x7f0000000140)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x7, 0xbc}, 0x10}, 0x70) ioctl$int_in(r0, 0x5452, &(0x7f0000000280)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x2, 0x8, 0x1, 0x6a, 0x3}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt(r2, 0x65, 0x1, &(0x7f0000000080), 0x1d0) bind$can_raw(r2, &(0x7f00000001c0), 0x10) close(r2) 10:34:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000540)={0x80000001}, 0x8, 0x80000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x2) r1 = socket$tipc(0x1e, 0x5, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000440)={0xdc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0c63000010630840000000000000000000634040030000000000000000000000000000000000000010000000000000000000000068000000000000001800000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/63], @ANYBLOB="3f0000000000000000000000000000001200000000000000852a747001000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/159], @ANYBLOB="9f0000000000000000000000000000003700000000000000"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000018000000000000004000000000000000"], @ANYBLOB="0d6300000d63000008373d0000000000000000000000000000000000096310400200000000000000000000000000000001634040000000000000000000000000000000000000000000000000000000000000000048000000000000001800000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a68770a00000002000000000000000000000000000000852a68730a0100000100"/60], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="088010400100"/20], 0x3e, 0x0, &(0x7f0000000400)="da89110564c2a7c3df3788edaa20d373ab1e17f6b039dd05d47f2031bd03d8fa428606e6ad27201557139f137a5cec9db14ac83d0c89b9f42a18d3d29fd9"}) r2 = syz_open_dev$admmidi(&(0x7f0000000640)='/dev/admmidi#\x00', 0x8, 0x4000) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000680)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x4, 0x0, "93ecb7dc835695949a6515769fa60b2345198ec43baf21151881f7f64dd5a8188dafe8992cfda5afd8c6c4364dc13deb00e5ff94d6ab6c8f8002aa133e9bd36ae34e4cd0d8b9e8b80d865b021f809d89"}, 0xd8) setsockopt$sock_int(r1, 0x1, 0x3e, &(0x7f0000000080), 0xffffffffffffff9f) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x101, 0x200) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000004c0)={'HL\x00'}, &(0x7f0000000500)=0x1e) r4 = getpid() ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000600)=0xfff) fcntl$lock(r1, 0x6, &(0x7f0000000480)={0x2, 0x3, 0x9, 0x1ae6, r4}) 10:34:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:07 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x96\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0xc) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0xed, 0x6214, 0x7fff, 0x1, 0x2, 0x3, 0x80, 0x200, 0x6, 0x9}) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") prctl$PR_MCE_KILL(0x21, 0x1, 0x2) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x800, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e733d756e69f82c6163633d000000", @ANYRESDEC=r3, @ANYBLOB=',access=', @ANYRESDEC=r4, @ANYBLOB=',privport,permit_directio,fsmagic=0x0000000000000a09,permit_directio,measure,smackfsdef=/proc/self/net/pfkey\x00,\x00']) setsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000100)="7b6e4ab879a57e0d960d9488fd39c253289aabae498cbfabe71201db1b0075ba3256159f47c71ebd475e8dd16b52dea1baacfb5c5b8287a4a3da4c0f5267af5bb9031004b0fb01fa39f050233f98f37e7fafed0cfc7db9faae02aa6ec70d5e84ecf343e820e68c5be0ee0ef989f19f15ea5c80936761c2615378e87ad05bbe594b3b6f3a", 0x84) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000480)={0x28, 0x2, 0x0, {0x2, 0xfffffffffffff89e, 0xffff}}, 0x28) 10:34:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1091.860344][T15019] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1091.886007][T15019] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1091.926350][T15019] Error parsing options; rc = [-22] 10:34:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") prctl$PR_SET_ENDIAN(0x14, 0xffffffffffffffff) unshare(0x2000400) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000240)=0x54) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xff, 0x40) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$sock_cred(r0, 0x1, 0x2d, &(0x7f0000000000), &(0x7f0000000080)=0xc) 10:34:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x10000020000000d) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x200) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @empty}, &(0x7f0000000080)=0xc) 10:34:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:08 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x80000) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:08 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xd8, 0x600) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x10000, 0xff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000acd1b001fffffff1f000800080004000400ff7e", 0x24}], 0x1}, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100)=0x1, 0x4) 10:34:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1092.451691][T15162] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x18c}}], 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/dev_mcast\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000100)={0x7}, 0x1) preadv(r1, &(0x7f00000017c0), 0x1be, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) [ 1092.509428][T15162] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:08 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x0, 0x80) r1 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$pppoe(0x18, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) statx(r1, &(0x7f00000002c0)='./file0\x00', 0x1000, 0x0, &(0x7f0000000580)) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$nfs(&(0x7f0000000380)='nfs\x00', &(0x7f0000000480)='./file1\x00', 0x2, 0x6, &(0x7f0000000a40)=[{&(0x7f0000000680)="909cc956ab3221cd731c2575bd4b62f8ba166864a90408709a90e17b32ca1b1dd120b4f312ed36c2c2b5ebf8c3d06e3fef9d5511ee0e35fe21ffd5f1d5c214ac6b201b3990eb7c48cc9840ca54d73c357cd6a6548a736eb47b292482dcf6c4065b6844279eb1812f1b7ad15b3faa1f7baca040c32c171a2f755b", 0x7a, 0x8}, {&(0x7f0000000700)="6bf2f10671040e6de09ce0c8f7ebcb95d9bb3f092ca1f03d05fb36b599109186fa5cdc2b389bfcef030026c118db4e6c55c398f7982ee5680872314ec19f6c8213aa4671944075ab27d6d123403e4b7c51dd3d90dca69da120eb16745ef2cc36ebe8f72ab3969f58e009ca0baef44b2d007ec56dfda952cb311f9c67b9bec675266c98bd9c427d787db6db32ca8495cb416ba0f587cd6cd2ed922e17033e4eb98f047d56f2dccc18f310c20213c50296a03f9f46a538963b", 0xb8, 0xda6b}, {&(0x7f00000007c0)="b7e6a2b3901845a8b9c49147f2b92c025e1c88cdaf7a77177dee200f298479e8e2e9e8914c67a8f948abc9455a735e4cf2729377878f61d0caf729462b9f719b1912b31990987f5e176f0276a9d8afcd042b9c852cf76cbc53581fcce031c1005ea03fbd4d5ee93c238331e7da6b05b2a6ef6ed456c67c5eee625b5f12eea04ffa3440951188164ded4222d747ebbb1233dfc4d7fbc32ba3f7aa8c66fe15162fc1d0656415f2e0f9b6dc521c06f13e5df1491ffcd28c60b6ae2fd7b0d657e14ecfa188097da492c0e546fa7f6533adc24111d07a26c9c013f1", 0xd9, 0x20}, {&(0x7f0000001400)="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", 0x1000, 0x5}, {&(0x7f00000008c0)="cd345df4213a77cc064655ca52b92bb9711c29d3e4bd6d3795369fb654e3bdab409ac5ccb8c397c9ddb38b19b54821127a55e183cfdac62379430275e669f2c58122387d46963d5ab9ec62558dcaf87a4fe12cad6b733009da8ca1e221e1", 0x5e}, {&(0x7f0000000940)="f42ee009d426364f67f4a9d529cb260578a350638a7d061ebb1dc599fd421983e7cc81f96b161654efaa1dd97f8a15e2cfbf56cfed933e7d3badb241bee8e293390afbe20d3db3d623a1379896304f5ed31a1f6e5b16c6766e7932780ab58e2caf157ac795237cbb49b93ac650df752d84b3041044754f733a2791f0e42405d5719aa7df9729273ae420d253b659639d7bbe7f056de6a201ae1026981fd869d7a407804bf07bb3b95c19a56ec3cf048ec7ae63db4fa69f385d587ee51973b44009529b69cfbf25e45b93dd1a0b7ad32a3df3584c9ffe8cca280a1f2beb4e81aa8ad98c96", 0xe4, 0xfffffffffffffffb}], 0x0, &(0x7f00000004c0)=']+[{useruser\x00') chdir(&(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000b00)={0xfffffffffffffffd, 0x6, 0xcff, 0x3, 0x400}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() accept$unix(r0, 0x0, &(0x7f0000000140)) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) sched_setscheduler(r4, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c6531ffff0000000000003d2e2f66696c653100d5d907abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c01455c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade46ffff5ecf02404282d8f6a0"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') connect$ax25(r0, &(0x7f0000000300)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x48) getsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000b40)) 10:34:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1092.617481][T15162] Error parsing options; rc = [-22] 10:34:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xe0P', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:08 executing program 1: clone(0x2500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000001, 0x8000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300)={0x1f}, 0x4) ptrace$setopts(0x4206, r0, 0x100041c2, 0x200000000000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) connect$caif(r2, &(0x7f0000000040)=@dgm, 0x18) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x1, &(0x7f00000001c0)="8d48fd3837e4a5102cefdd76f800c17e415c878db66e35017227b0b78f28e6d66b6861083c33b2640235fb3329be80ee547f1fd03d050a4a0a6750a17c953826c36f845ce9cc42809bc0f720c2599f04d4bfbc8842b4e991cd9abf398d713b3414801c1b314a2e1386ba2b663ad142c8df") ptrace$cont(0x9, r0, 0xfffffffffffffffc, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x6, 0x509002) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000240)=""/176) 10:34:08 executing program 3: unshare(0x40600) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/130, 0x82) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200) write$FUSE_DIRENT(r0, &(0x7f0000000440)={0x5c0, 0x0, 0x7, [{0x5, 0xd46, 0xef, 0x5, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}, {0x4, 0x3d2, 0xef, 0xffffffffffffffff, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}, {0x5, 0x1, 0x9, 0xcaac, 'ecryptfs\x00'}, {0x2, 0x4, 0xef, 0x1, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}, {0x3, 0x3ff, 0xef, 0xffff, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}, {0x5, 0x7, 0x5, 0x2, '+eth1'}, {0x1, 0x8}, {0x7fffffff, 0x400, 0x9, 0x5, 'ecryptfs\x00'}, {0x1, 0x8, 0xef, 0x2, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}]}, 0x5c0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00q`', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:08 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100ffc, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0x1}, 'port0\x00'}) [ 1093.144790][T15237] overlayfs: missing 'workdir' 10:34:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1093.180935][T15308] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xd0p', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1093.229397][T15308] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1093.243012][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1093.243075][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1093.348451][T15308] Error parsing options; rc = [-22] [ 1093.398729][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1093.404576][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1093.485024][T15294] overlayfs: missing 'workdir' 10:34:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fchdir(r1) r2 = inotify_init() ioctl$int_out(r0, 0x2, &(0x7f0000000000)) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 10:34:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:09 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f00002d6000/0x1000)=nil) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f00000004c0)={0x8, "ed049e2b371f13974379b753b4d049a0040a25526a85b3f62c21365f8e7d2d46e77332510ecc80d9a1f94fbb5b81782f0845d51d665f64a7c65db8057f2ed408266232bd3d520028964a895fceb3ee0fa5f906a2cf8dc4a20bcdcadf7eebef5b721a3647eec1e2ff46940cb9a0ca3fc201ba2b3bdfb3e0391144b2d95b18ae3862b03f6afd906b224cd4c07476661066561d6fd484229fdd33cc92a7c74e51398c9562e72519d6a178c37f1d1d0f3113ae7af0e16553de23b4598bf363fef23fbd10ff2fa73129282320cc4f4e8c263e36859995fac941ed0f41a5d3441bca8dff6e62a8d6c942d58733f3c65cf301e6d5fa910c517e5c7637ec6e3535c644b1162d4a800ec6d3ae19ebed2e4490c28d2034e3e406dabdb667239470a6590adfaff1ecfc45da578aa70a71e6fcd07145edd94fe3580e73eeafadcf0ba97b33c504c1b2fc84be451f3e50058daf159e974bc90c9b619f9407b83a46ca8088e18dcc965a4f221355e2a36f281e4f43e40d0ea458c5c2bd18d0e7b14e119c96acc1289ac4a1d344f9a1311fa41e54c43a3cab63654fb63b96e710ec68e5f049d7f4ecdbd1cb4df71ae5ece7e343c5dff88bbaccef98a1588c81184e1e5508d22ebe101c8085db1ad97a07bc3d122b13063d8a92c4ab3c579daf683432335184022a8361ba1e71a5ef840c051a379bdca95f11bcda573f280538fc6b2ab902936cc7636c6c95cec54f9bc5db6b14590c4310cf952337401f27a8ccad1827230bb78fd349d7f3af9aa9b72d79eb7b01b57bb41f9715595b4aa9b4512b0a269fea09c8e1ba73639d0c02bc1312ba5e1a1a18aea02277585ad0bb3d06c4b9235b5a6c8c9be9f543ba7537d8816f8dfa9aca29e597f1e9c4d5d6098104dacfb69b7d89cc8041f667914397bac9376daa9315c5b506feb72b0037ecc0ffe925244d28cd609edd20a2a2b6632d319a4b3799df587cedf37da059129a25b3b7c6622fb43b6aa6f114de598358d3152408be1f479530793c576038bb54ebbfb996982ad94b68eecafcc13ba87aea8329a9a89962ea5948f3353f41118223519fade286ed1636f474a3007015c97efc7b8948c934a71a41544ed1e8ace903f451cecf134c4c0121cfc4cb6969474ac899fd67b34a49ed146cded2bcf087b8f9d34d2f97cb437b22823feb229d1f31e744f16619a0d1dfc272c6c5e2fa8239a88248ef255fcc2fdbeaa3851f2e7ed528f4f3fdb41de88dc07ecefb1e772c9ffb15df3453a5aad8d683ee2e9e2c60b08c76c0cc860cc277a5cf244e760532466899421625c7dac976b9fb3ce946572a110477d43aecbf182aaa79814237be1c677864ccc07a6c251348429fb3aef53e94dbd516a614c1490ffeb6d69b72543f846336a454cc09beca3ede2aa4315d850a63d8eb5d6515f6cb541ab3fdd1908bd7ec0f9af17156d73419be83375bf66f0a35e372c27f79d003e40c4458fd97e1cc1ad0911bf7f2b836c2d929ebc227f0c03163fae21a8ad793e57a01220618b07ffacc4eebb675cc4ecf8b5078ac7594be130ae80b412a5437fdd97f1328d61b9c12fef4fa8668354c2e07958a319547151497a2fb696f9bc4fe22e3a546d64b82401b17086badbbd698727e95c72f5919e690e0e9cf59ca6fecdd497848e0b1dc969c5fb690d5a3311932c15b78c2455822f85d313e767becee11550ca5835eefca28d22fa6785b021fee33f7790f3f8bf472fe97e95f0316fc0d1775bd30f9186491709330e0418a06664819332c1d77f10dcab91a820fbd8269de6290f25c6f308825132ac5b4d4ebf6bc6961fec1252223a8794aed44cab2ba1895d180a926d1971226fdea1fc117c265c8b1d0ac06d5d8f0d9b1286cf48d2211e53fade6a957c98dd32e8278a190a7b6a99cf19bd928a366b1d60fbec0830ecc61fbcfc7336bf691d621771fc8dbfe4a95dda6d297255ac728a2a0a9899b00f04273358a98e4e3abee486a906b89ca8b4ced909fe47fa8cf625259c128b56a2e6f1d80282c661628ab2d4a7c4cafd8ffe79879c7f6cdfcb600876f9716f8de14bcddb26bc8a1111ebcfd6d52658f7330848b7aac52e3c7dcef173439dad01b0cab23190b546b29c6a341c23687052bac43d66ebc70d830187d55a78611af55dc4e4b7994b7b908339294e4f9c8b8bf5224b9bb0361e605c212d343f05f4d6d38f3287d663989efe322e570018d0d526dc68a0f1585fce73d26e746fa1e78ed5ed81cf054103d7a2dbde26ff2aad2b8c64342c5b849824227f2e9244ecdbb43a4883928c888e9c295d707ad43d77e064527586bd9fc16ddb8104ff27a04d52057472cbe73ed68b676bf1b5ad76c62c5ecb36964f5bbfbdec5c5781ffe75e68aec91649d0f9ab1ce9385d71fa891b305e3dbe5b13f3c374f2269d682827a262eec28bdb416d9f4c2f73c68bdbbc61e8e69465125c77f5f430d872b993250887218765bd7fced6efacf489dd30bd14c4fb1d4db7c32f1e54c1295fd0b3222644fa4f424874a520c38e6a852f9d9a04471b0551091d2b6b0163971080fd0e7da0ecbf8a817aacd89b934698b2f45104d8165b20368095bac8886cc82e987fe9a24c82bf6842779176c7a6d0729d10084c10791053a68461d0834483ff22d7513b11a57359f35e8d2a85551b89df93ac378ad0587fb4deaab913ce0c54c78f692979c17a80291aa932904b5fa6eb391c63be80817d8c548c6599027e7874f648e73aa2b614f0d4c8589b2f348f1c08e1c9d3389830077383d177f6a9595df2ca08066deabace5aa32c82544e0f64b5d7870c3c9cf904c3b34bcea99dd124656c60ed0dd7bdbbdab620b3155f2bc04bb1b13be0507fbbb7c953d5c22a25efcc03c7bbece5503a998080df840e07a58e1fa64363c6eeb7e184fc3396e17e90fd27e592d8e077b5a73c8ced337df5a755f5b0a925772546a8e9465a94c9dc409162c5a2d88cb0ebc7484722bc88eb8718c2946689e99b3f400aa2fead0158e3b8056610f530b9af2214e519ac82d39bbe53466d6d41238011ced94ba2995a9fc47a8fc6bd582ed35d6da8eb42150c6d98548ff5d2627be878d92d150ecfcf48c2c7f251305f96ce902c3f4167297da31211d55b7edf119998f8fac7c9b1896be7bd1c1256cb14b8860fbd3ee8717d86d5e33e6a8bf4985a8fc88ebd874365bfa207dd0b7ef88427eb5f2ab7b06f3b47ea81bb2c23a417197b98928d0aa74f031eb4607a523a317956c4a29c334414af0b0c52056a3809440e0e72a76cfc262f57e0fe68cf4f184c573da4600a12bd3b02d60e8a07fb3cefabab6d555fed012abfdd27480ed2e6f41d98864ae4620a8965566dd2f0805fe00a2c0970829d3c1dbd5dbce3b8c26e305013990d83cc9ef2e7ff107b620e5de50a23888c3a3d8fd2095f3005e7eecbd058ad522fd4558dbba4ac80dae6f3d8b48e15e605b360bd7c474a9102a54aa4e389efa0d3f5715cef511ed87b6193f61b3060af73c5664c54f45d338acec8d26026b37e4fe353912d182f47fc6ac68fe3634f237b3b4d38fcffff5cffd50c1db2f3c258da1d3e2eaedc15b65d8cfc84d8b440e83d3638e42190c1cc6de23894fbe1d433c1c189b357f4e88799128241b4fd384ca9358c9217790302cfe0250653f72a80d6e57c50ebf6eeed2b05b853dc0fa2fc5e0ddb4712a763c30c51c5b717a5dc5e82a48bad5cec610907987e8e9ebd717e58650a51c69d3d124ac840cae9608afb8d7e9a42ca2d539120aa978a4fb54c472fff026d9c1add91f95be9c3f5119700bc0a3fd4d5d7b9f8657d1d3574b9af07e6f9b0a61f2e6a4f6957a7dfa00cc548a28eaee7c64eeba12aec4079e4fe2cee5dd54e6514e4b72fddac2b331830258a4bf698f20aa84aba90cbf258e43f0fff20e94df3659797e6055499a9dd510c3a659037aad1417ff53f5240f4969c20d75799dc86f166ce66f6bd13cb14f4e3825f56b3dbf643661d3b3cf3d23df4dcac0d835af5ab0510fade64373ad7c4aa67351aa31377faa76d8eb4887f861c85e8181a5b3c02e3d3ea6c2389e03f2b3a6abcbd391321a4629fe6b078df22b038595929f39ecc014ceb6b41d9f7e563600da19c89b95cd2ef327c82d194c8e7e3326879a4b99abb2bcc607fc2e3d17d59ac4142bc3d6072195799e498d97f908eec60a90b5a94b2fef207385411530d4ff9ec49043a0b758c4d4fe9b787e9dc1645cb4fcabc9523fbcf59ed5a70d9f8873a621a74314d04053291dbfa004d3bb8b1b489767b0b59d850a28f97d2b181813fd37666f998122872ccf92d5e27e34711edc64da3e21be282aa8a07347e764cf4dcd8e6bbd8003f39d88aa32efb85945757b5a308d05376e0ec041f6408e1732c9f5114781dca5d0d65a4e42aae16e815a27243a003775797429ad24b7358755ff54648fa0828aa316758b8529480136790e5916ab3f360d0722f4564c106f40a2ae2ed4b83b488e60ded938ee52db009333e3e91226fd5bf22a189359bf368ca27e4da80b0799856c228c39ef38479a7ba2c89dee4d44525a95f9bb07f4bef1190ec56683705cc069a85c6f2cec47b986ef69adac74887d71590b490f864c793b4558294e9f8b52c79f1779a36164fb7296488105c2aa5fe9e8bafef21d44c74bbe46e5c42b5523dcdcfc50c8c50997839842c8618026181da74d8dd5afd2bf9a08cbe13e2cdcd1d7eeb03ec329b549aca1b3dfba09f301ce603bdcb6f110fe05de0a7bda11b1e17bcde5cf3a308e09415dd448a0fb5a05251ff5eb17baa415db5da1d24f1836c86f9839f68e7943fcce9c1dd4a60d69f90ee8b13cd57880262ce44b197be1a009c0d75f18369ada2f18d75e88850a4af674a35286b439f94e513e641a69bc9cd6473bb111f5221db70d47310ed749454047a4c08f2ca2def2664e34fbb7347642bd6123ece70b7a5484b847b227983f12758747dbc663ec22d34e8aff7adb67b0459e7258d78eb97301d691f1d4005b5259c3cd549179fc29109d5a1e88275724fd327551f7fb0b0ad2dc74ef30f41b7697621d11809dc5a75b13dce380b944fa16b820cb2a96132f7396b495337ee8d26fac96bdde4c9c5c6b54e5c8b0fb5c1d1f8e003fb0717c2c469d45ba307896bc0a744a10e852448c41a8cc6ecac28287d4b8f5d76a4c2cc3f23f38e0f40e406170100c80def34890ca5d08da55aa010682b91ba1f52ebef6a18715d81fb350afc902ce9fa74dcca324291edf652adb2151c3e5fc6823bb537576796552de361000f46068467c781c0c72d7d29061ec5bb5d32aead82dd95701c065df3aee417d65b2b86ffc564b1c02b28c00ed6f269ff04ec0362ea1648055b6389c2578375ada5e31cc170e1a5cf24f7e9df86d85c874e6fdbc8dd81477cbd83b486ccc79b2b9f7ee7d46b6ec25199842f8608cb5851ef4d24afdc8564b97c5c088570937b55322012f5177104f74ccbf0234bfd1af7186253a1f42470ff2b3d5eb8a5b5a4605d98cf35cf439c7eb8c820ae6869c739806c413d6f1e9c72483712deef0db9f2e2146ca873c0bc6ccbd20770dd0df1750204ecfaa943cf5327e3dc3e448abcf67bd95d192062dc3d4ac02f0ead095cb7cafd108d036570d00f972bfdabf2f014146affdb70c3896b11749c87d89a6a6a939ebeee18a7946b929467ddff95bfa44670fff625954063c4cd9e1c1daf70255c4caee0ad68563f4603b120b38669b4342d5746f27f0b5bebad1a159c24e7e968c7027ee35c528a3245d56e63eaecd6d3576295f6bca7bc600d3f27de2", 0x1000}, 0x1006) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') accept4$nfc_llcp(r3, &(0x7f0000000400), &(0x7f0000000480)=0x60, 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000080)={r4, 0x1ff, 0x100000001}, 0x8) creat(0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0xd662, 0x89, 0x5, 0x0, 0x9, 0x2000, 0x3, 0x1, 0x8001, 0x2000000000, 0xff29, 0x100000001, 0x42, 0x1, 0x8, 0x240000000, 0xfffffffffffffffc, 0x8, 0x6, 0x20, 0x91, 0x2, 0x10001, 0x2, 0x6, 0x1f, 0x7ff, 0x3, 0x4, 0x0, 0x3, 0x80000000, 0x80, 0x800, 0x6, 0x0, 0x100, 0x1, @perf_config_ext={0xdeaf, 0x7}, 0x800, 0x21c, 0x0, 0x6, 0x95d, 0x10001}, r5, 0xd, 0xffffffffffffffff, 0x2) 10:34:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00`q', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:09 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x48000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00v', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1093.660605][T15435] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1093.766834][T15435] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1093.789971][T15435] Error parsing options; rc = [-22] 10:34:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x96', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11a22c520c6c88e97e506c8ebcad4c8057d61a97988f652b95a0696a2cb213b7ba91813fc9f1d62997348cf626db2fa8be9059bd9f4db71ab16179bdc28fcf5cf3b407023092e6078c3b5665cb139fb3", 0x70, r0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) restart_syscall() mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(0x0, 0x0) 10:34:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x2, 0xc) write(r1, 0x0, 0x0) write(r1, &(0x7f0000000080)="1f0000000104fffffd3b000007110600f30501000b000100050423ca0000cf", 0x1f) 10:34:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00p\xd0', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:10 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000100)=0x8000, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x10007, 0x1, 0x6000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 10:34:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0x8) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000080)={0x10000, 0x2027}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x16, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0xffffffffffffffff}, 0x30) r4 = gettid() setpgid(r1, r4) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000180)={0xb, 0xf3b, 0x10001, 0x4000, 0xffffffffffffffff}) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000240)={0x6, [0x2, 0x4, 0x80000000, 0x441, 0x20, 0x8000, 0x7, 0x401, 0x10000, 0x6, 0x0, 0x9, 0x7, 0x6, 0x7, 0x2b3, 0x2, 0x6, 0x73, 0x1000, 0x400, 0xc8, 0x5, 0x3, 0x3, 0x0, 0xefb, 0xfffffffffffffffa, 0x401, 0x101, 0x1, 0x0, 0x71, 0xf, 0x100, 0x5, 0x20000000, 0x0, 0x5, 0x5, 0x101, 0x1f80000, 0x1, 0xfffffffffffffffd, 0x5, 0x100, 0xfffffffffffffff9, 0x80], 0x7}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000002c0)={0x4, 0x3, @stop_pts=0x2}) r6 = getuid() fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000340)='./file0\x00', r6, r7) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000400)={0x10001}, 0x4) r8 = open(&(0x7f0000000440)='./file0\x00', 0x8000, 0x40) write$P9_RSTAT(r5, &(0x7f0000000480)={0x65, 0x7d, 0x1, {0x0, 0x5e, 0x98c0, 0x800, {0x50, 0x2, 0x1}, 0x40000, 0x1, 0x3, 0x80000001, 0x16, 'cpuset.effective_cpus\x00', 0x0, '', 0xf, 'selinux@md5sum\x01', 0x6, 'wlan0\xbc'}}, 0x65) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=r3, 0x4) readlinkat(r8, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/148, 0x94) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000640)) write$P9_RLINK(r8, &(0x7f0000000680)={0x7, 0x47, 0x2}, 0x7) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f00000006c0)={@remote={[], 0x0}, 0xa, 'bond_slave_0\x00'}) timer_create(0x0, &(0x7f0000000900)={0x0, 0x2d, 0x5, @thr={&(0x7f00000007c0)="99211632a0", &(0x7f0000000800)="696409d1442a4a9e0dcf998f73ab3ed0443e08c3aa9255c91bce318f86486a2c9a470c3d5678a770a2d11c2870da1afc971676b3d75b973eec324227c6005b6152ce017e20b6e8f1823dd4b5c4a4f6a1cd523e0da2b2729ac7d89d26f72e305dc6e6aeffb954ccf7b0aa118bda37a191f46018d6f4a67f518da6150251e81a7f9d86f7adb25e8e14f55ddcd5f29398267f861712bcd281afad766312695610526ed6db2829a0bb6e58611ef87cc0693613540fba8989974a77c496201915b2b1e7b58bc0b20e"}}, &(0x7f0000000940)=0x0) timer_delete(r10) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000980), &(0x7f00000009c0)=0x18) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000a00)={'veth0_to_bond\x00', 0x56c2}) fcntl$F_GET_FILE_RW_HINT(r9, 0x40d, &(0x7f0000000a40)) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r11, 0x320, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) 10:34:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00P\xe0', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:10 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="4301c1a62741a4700efb52d47cb2115c1400f5b9"], 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00'}) r1 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000400)=""/148) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 10:34:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0x24}}, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000140)={0x0, 0x4, 0x1ff}) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x1) 10:34:10 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x10000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) r3 = getgid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001800)='/dev/sequencer2\x00', 0x20000, 0x0) r7 = eventfd(0x5) r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0}, &(0x7f0000001940)=0xc) r11 = getegid() lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001b00)='./file1\x00', &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000001bc0), &(0x7f0000001c00)=0x0, &(0x7f0000001c40)) getresgid(&(0x7f0000001c80)=0x0, &(0x7f0000001cc0), &(0x7f0000001d00)) r18 = fspick(0xffffffffffffffff, &(0x7f0000001d40)='./file1\x00', 0x1) r19 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/mISDNtimer\x00', 0x20000, 0x0) r20 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/video0\x00', 0x2, 0x0) r21 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/mISDNtimer\x00', 0x200102, 0x0) r22 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$unix(r1, &(0x7f0000002040)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000200)="d4aa1cb918f2dde7ee7f24b68deb1a6ab1f0ca98b4edd095035bd53924f7bb9a8ee9791b9dc48ef3d1f00aa127231a084fe1ca08c24f43678c80059deaf55f8efadb1da64c8eeb4c618621e315cd1564e31daa7988f34c5d2a8cde2f6372173f4c867b40395f5401814a825d948a92637742d294c5a5153bc3cad2a80c752e989d30723ce12d804e931118ae67b991e9542f4a49b7e5364bf6ce17b52fe3f36b51b1500dec3b4e549ca7b55c48fba329d019476c74868b92ad87d8665137e13054c8", 0xc2}, {&(0x7f0000001440)="31060addb1c6bc0b0782700299a76b7ea8951a5178541e6d6a4fe59f7df05efb24352d50280b9c86a06a1539d4f1701a0b97bfac8cbdb9bd8fd7c7951535a0379f07526dafbed86e7c5ea17869e4b83eeec3f30629545e5451d7a2c0f370ad7d45a280ea0cfd0a7218f0b4cafb6b4a70eef6043a2982d2df944581e77b9388cf952cca45a8e6a86b773b3fc0f129b3533af6d7c6e335bb3307623e1cafa273e533651007eccdcc941a7ad22fef57eb8d102c7fa10fe8a39d00488b25a64c27499c6f90a7eeb002a5016bdb0eb3e47757f0", 0xd1}], 0x3, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {r0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r0, r4, r5}}}, @rights={{0x1c, 0x1, 0x1, [r6, r7, r8]}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @cred={{0x1c, 0x1, 0x2, {r0, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r0, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r0, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r0, r16, r17}}}, @rights={{0x1c, 0x1, 0x1, [r18, r19, r20]}}, @rights={{0x18, 0x1, 0x1, [r21, r22]}}], 0x130}, 0x844) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x2, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r23 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x4000) setsockopt$netlink_NETLINK_PKTINFO(r23, 0x10e, 0x3, &(0x7f0000000100), 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1094.677082][T15640] bridge0: port 2(bridge_slave_1) entered disabled state [ 1094.687636][T15640] bridge0: port 1(bridge_slave_0) entered disabled state [ 1094.885986][T15715] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1094.903690][T15715] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1094.919149][T15715] Error parsing options; rc = [-22] 10:34:10 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:11 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0x1f, 0x3ff, 0x5c3}) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1095.292116][T15925] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1095.302341][T15925] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1095.319668][T15925] Error parsing options; rc = [-22] [ 1095.430910][T15704] bridge0: port 2(bridge_slave_1) entered blocking state [ 1095.438116][T15704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1095.445591][T15704] bridge0: port 1(bridge_slave_0) entered blocking state [ 1095.452964][T15704] bridge0: port 1(bridge_slave_0) entered forwarding state 10:34:11 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) accept4(r0, &(0x7f0000000100)=@in={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x80, 0x80000) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/vsock\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000002b40)=0x400, 0x4) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1095.489162][T15704] device bridge0 entered promiscuous mode 10:34:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) syz_read_part_table(0x9, 0x6, &(0x7f00000016c0)=[{&(0x7f0000000380)="990589e4346ebe8db1001f2085937c1172486230e3cecfb76ea4692c11140d22af63a4fbad39555034c49a129abe9aed0044573c0c2220d1cba15a24974a3cb7010f6db756e2cd2b8de58068770baa23bc3971591c637c9ca75ce722b881b93766be6e51a2e9ed9993b3854d40efb1b99f6ad21f96c4a1ac96cf57eac11a309276467a4546293fe77935b450ab0b37", 0x8f, 0x7}, {&(0x7f0000000440)="cedf6354433df9541433126bb960c7ef0d3bc7a8b96fa2aae2213f161c1671efb85e1d0192cf4e0cdbfdb9316a61f81a37d8688d1adaaa5f72c31553c6f86e9c781bdc5e9ee249c908d123aae3e8f89f466a121719dcd5b7c07ea3a383e6623d5ccd752dc3cb0a9485e87effc6ee4ad59f923b80995652b1f905540fcd4493c8cdcf52204349315d7132194485c1cff5849ac836fd", 0x95, 0x7fc8}, {&(0x7f0000000500)="9f5fb4d269b410f156b5b81b519b11292517e0a3f4aead78d31ba7c76c739e3f8c4d00bdef612b2b644d17294e3c9a0c23bd2a83c65bf67dd99ef648f7f365e8cc15cad68e1e03d35c18f6d0fb2215299deab91a68155c4f1121d4424edb68e8dd98d1e3f4198c372891f37a0288b3446606a77b9a263d2a4ab54722ab7d9268d51cc915ab1f77cb58556a36d1cc05d9dea384afeafe30b1316ff85fa5b90d18a3f229f19172a9573ffac9df2821cce0a272dd6fb4c84fe31c15f2ff3d6118b1f1785e5db2f6d51bd93e5c189077e27bd24a1a1a681307b57d6cd059dcd00e2117b1d24c9bd35fd59776b291904c8e", 0xef, 0x1}, {&(0x7f0000000600)="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", 0x1000, 0x5}, {&(0x7f0000001600)="0128e7d720ad7c0b230d1242addf0dd71a4f74fca1517182668ac2a6fcc5f6ebe8d8403fd959d3676e7e27c549fbf315201b36532c05a7330589ed1044afedf08bf7ba5fa6455856e14791a77f03d818cbef65e7b4200aab8a63ddae5eb804c2a068c8c8374d831b1b83f1fdafc579c7e3adcf9cf8d5753e202bfa37471bcb9f4804869dd5f1002d39272d46081c8f56e97b2ed82ca3f9e3154ea25b255af9c805e682dc428ba9f641672c0f96c15a31415cfb7847840301fb8e90b8", 0xbc}, {&(0x7f0000000140)="ec385b97c6205ef6d8fd62f7d2e1ff47c18942b7cb6aad4126b0b1984d676e9012ba08445a96020c38fc1ba2d54d323eb805102c53782711bf2b7647f1266224", 0x40, 0x2}]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x100, 0x0) ioctl$TIOCEXCL(r3, 0x540c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r4, 0xffffffffffffffb9, &(0x7f0000000080)) chroot(&(0x7f0000000340)='./file0\x00') ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffece) ioctl$DRM_IOCTL_GET_MAP(r4, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000008000/0x2000)=nil, 0x47635eda, 0x5, 0x11, &(0x7f0000016000/0x4000)=nil, 0x8001}) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000001c0)="c3b458a2f46c14ca40efc0408ddc6a74d4c557e5bfe239841446e2283143da98b5926c673c31914ff693d8490d8498bd718ef7f042cc086023a1b459e969be653b8c1d59050d4eddb3dbd037c81746e3ff31f5a013103fc432a0e50e8d4e02650728ad7348f6baafef68efeb2592e86b61622494fba5744eac2089ba51890457cfade08705c9d45bd47105fac29255296c99520c21db927d2fb85232f44a9addf946227ddd75edf4fc1994ed4da43a4f3babe9e6e7dbdd0920d642123f101a390883e67dad3d807e49db43748b8c0466a6cd2196f1cf231cd4cc9669cf220bcf", 0xe0) 10:34:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:11 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000240)=0x34008, 0x4) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x206800, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0xe6d, 0x5}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000180)={r4, 0x2, 0x9, [0x9, 0x7fff, 0x100000000, 0x1, 0x4, 0x2, 0x5, 0x1, 0x7]}, &(0x7f00000001c0)=0x1a) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x2cf) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) [ 1095.739720][T16040] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1095.801516][T16040] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1095.873676][T16040] Error parsing options; rc = [-22] 10:34:11 executing program 1: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) recvfrom$x25(r2, &(0x7f0000000180)=""/76, 0x4c, 0x0, &(0x7f0000000240)={0x9, @remote={[], 0x0}}, 0x12) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000200), &(0x7f0000000280)=0x10) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xe8) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000280), 0xfe31, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xef', 0x0}) clock_gettime(0x1, &(0x7f00000060c0)) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x84d075, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f00000009c0)=""/240, 0x1d5, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0xa, 0x1a, 0x12, 0x8, 0xa, 0x4, 0x6, 0x156, 0xffffffffffffffff}}) 10:34:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:11 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x50746a6d, 0x400000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) rt_sigpending(&(0x7f0000000100), 0x8) 10:34:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1096.274191][T16176] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x147, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffe15, &(0x7f0000001300)={&(0x7f00000012c0)=ANY=[], 0x1}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="4cfda2f63623a20b5ef6a56a10fbe610db11d10e53ce00147cd299855adafb1efb37fb72588c5e92e3ff4852a0270ea2edf2570a46cd0daad7a8e0eefd1a502946dcafff67a0118ad03a877576486144be4de9a13b86316cd1bf3e4b21d7470d124f15eeef0653b29003abce68adfb551d0201fa0cddec50c6d868") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0x4001) 10:34:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1096.363883][T16176] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1096.423483][T16176] Error parsing options; rc = [-22] [ 1096.439160][ T1090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:34:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:12 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x47}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0xfffffffffffffffc, 0x4) unshare(0x40600) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$getenv(0x4201, r2, 0x7, &(0x7f0000000040)) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000280)={0x3, 0x7}) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000180)={0x7fffffff, 0x4}) [ 1096.882015][T16306] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1096.952956][T16306] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1096.980851][T16306] Error parsing options; rc = [-22] 10:34:12 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, 0x0, 0x74c0400) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RRENAMEAT(r2, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) 10:34:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:12 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) prlimit64(r0, 0xd, &(0x7f0000000040)={0x1, 0x2}, &(0x7f0000000100)) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1097.161012][T16418] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1097.222596][T16418] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1097.240931][T16418] Error parsing options; rc = [-22] [ 1097.266243][T16424] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 1097.353181][T16530] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 10:34:13 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)) 10:34:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:13 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x401}]}, 0x10) sendto$inet(r0, 0x0, 0x33e, 0x200007ff, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x105300, 0x0) mq_getsetattr(r2, &(0x7f00000000c0)={0x7fff, 0x2, 0x5, 0x6, 0x8001, 0x74, 0x80, 0x80}, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x10}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r3 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x0, [0x9c00, 0x0, 0xa8, 0x0, 0x8400000000000000]}}, 0x20) 10:34:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1097.610191][T16543] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1097.638879][T16543] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1097.741719][T16543] Error parsing options; rc = [-22] 10:34:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) open(&(0x7f0000000040)='./file0\x00', 0x800, 0x17d) 10:34:14 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000080)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7c0000, 0x20000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) sendto$packet(r2, &(0x7f0000000100)="b96c6070ba39f206adbf3816c96e6ec0fa60df75edb256c5b75b63213f97223a48315954f5c26b363fdf4e4e5e08157df619b904975de581b7be1d975e5e2541862502f4e9acd2c145156184caa67eff4306e45034ff37caf3ad6e817615236bbe607363b7fb8d86ff892fd0f956cff77d6ed2b0794144fd986f68549ee38e31ee1c50b231356f7bdd2ff3f17f60a3336b3f5e2a6e0c5687ff717881872e77545963329df926e9b899f8a2929e64b9430991c172c5819d2d443263f9a2ac32ec40673f19880bb5d8f8b2e78348631ec84928647c634c6138c55330197f4b2ea67dffbefdc0ea53ed01b5ee1b365e0d465d64fa45", 0xf4, 0x26cc9a618635eee0, &(0x7f0000000240)={0x11, 0x17, r3, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) 10:34:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xfd\xfd', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1098.335582][T16688] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1098.378837][T16688] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:14 executing program 1: mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x5}) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x5}, @in={0x2, 0x4e20, @multicast2}], 0x3c) 10:34:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xc3\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1098.531301][T16688] Error parsing options; rc = [-22] 10:34:14 executing program 2: r0 = socket(0x1a, 0x200007, 0x80f) ioctl$IMGETDEVINFO(r0, 0x80044942, &(0x7f0000000100)={0xffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r1}) 10:34:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xfe\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @loopback}}, 0x9, 0x4, 0x0, 0x8, 0x12}, 0x98) 10:34:14 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x0, r1}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') utimensat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x77359400}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:14 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000100)={0x1, 0x80}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 10:34:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1098.956496][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1098.968202][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1098.979913][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.022458][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.034134][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.045766][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.060914][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 10:34:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1099.072550][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.084167][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.095802][ C1] bridge0: received packet on gretap0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.170719][T16839] syz-executor.1 (16839) used greatest stack depth: 20880 bytes left 10:34:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:15 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1099.256738][T16828] syz-executor.1 (16828) used greatest stack depth: 20200 bytes left 10:34:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000040)=""/11) close(r0) 10:34:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) recvmmsg(r0, &(0x7f0000005e00)=[{{&(0x7f0000000140)=@can, 0x0, &(0x7f00000016c0)=[{&(0x7f00000001c0)=""/29}, {&(0x7f0000000540)=""/4096}, {&(0x7f0000000200)=""/28}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/131}, {&(0x7f0000001540)=""/128}, {&(0x7f00000015c0)=""/224}], 0x0, &(0x7f0000001740)}, 0x6}, {{&(0x7f0000001780)=@x25={0x9, @remote}, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000001840)=""/98}, 0xe251}, {{&(0x7f00000018c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @initdev}}, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001940)=""/4096}, {&(0x7f0000002940)=""/173}, {&(0x7f0000002a00)=""/100}, {&(0x7f0000002a80)=""/11}, {&(0x7f0000002ac0)=""/227}, {&(0x7f0000002bc0)=""/216}, {&(0x7f0000002cc0)=""/38}], 0x0, &(0x7f0000002d80)=""/171}}, {{&(0x7f0000002e40)=@ipx, 0x0, &(0x7f0000003100)=[{&(0x7f0000002ec0)=""/243}, {&(0x7f0000002fc0)=""/11}, {&(0x7f0000003000)=""/194}, {&(0x7f0000003180)=""/98}], 0x0, &(0x7f0000003200)=""/69}, 0x284}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000003280)=""/189}, {&(0x7f0000003340)=""/96}, {&(0x7f00000033c0)=""/224}, {&(0x7f00000034c0)=""/79}, {&(0x7f0000003540)=""/39}, {&(0x7f0000003580)=""/76}, {&(0x7f0000003600)=""/73}, {&(0x7f0000003680)=""/63}, {&(0x7f00000036c0)=""/218}, {&(0x7f00000037c0)=""/34}], 0x0, &(0x7f00000038c0)=""/104}, 0x2}, {{&(0x7f0000003940)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @remote}}, 0x0, &(0x7f0000004d80)=[{&(0x7f00000039c0)=""/72}, {&(0x7f0000003a40)=""/180}, {&(0x7f0000003b00)=""/4096}, {&(0x7f0000004b00)=""/102}, {&(0x7f0000004b80)=""/131}, {&(0x7f0000004c40)=""/135}, {&(0x7f0000004d00)=""/67}], 0x0, &(0x7f0000004e00)=""/4096}, 0xffffffff00000001}], 0x45c, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x1, 0x410) semctl$SEM_STAT(r1, 0x2, 0x12, &(0x7f0000005f80)=""/4096) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000000c0)={0x2, 0x85}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @ib={0x1b, 0x1, 0x0, {"cf3aae7daf7d4f10a405d28d2f61f9da"}, 0x1, 0x465d7f8d, 0xffffffff80000001}}}, 0x90) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="2e0000001800810ce00f80ecdb4cb92e0a60042c000cd300e8bd6efb120014000e0014a00a00000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x113000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0xf}}, 0x20) [ 1100.170368][T17094] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1100.251678][T17094] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1100.288845][T17094] Error parsing options; rc = [-22] 10:34:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1100.347799][T17112] netlink: 'syz-executor.2': attribute type 20 has an invalid length. [ 1100.414936][T17162] netlink: 'syz-executor.2': attribute type 20 has an invalid length. 10:34:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, {0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800}, 0x0, 0x1}, 0xb8) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000000140)) 10:34:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:16 executing program 3: unshare(0x40000000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x102, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x3, 0x0) tkill(r0, 0x2a) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:16 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4080, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x100000000) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x0, 0x40}, {0x3, 0x6}], r1}, 0x203d57cc2b39b0cf, 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x210) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0x2, 0x4) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)=0x1) 10:34:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1100.809982][T17236] IPVS: ftp: loaded support on port[0] = 21 10:34:16 executing program 2: r0 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r0, &(0x7f0000000140), 0xa566c3aa4e0c4b1, 0x20, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f00000003c0)="9970024feb69d9cd349b0de6999ac5568e3e3b45b42c7433d9ea6a21fa5dcd05b43561f9f03a8f79a22b99766fa80ee083c2f7bb45f792395a5d1a3c137bcad9ee7258be556e9f9dc367316e0a5f8d76de862d58c95d1f284d691e53b120fa6dab58c4cc1a") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)=ANY=[@ANYBLOB="010029bd7000fcdbdf2507002e5300001c0005000800010075647000100007000c000300e13fc935000000000c000256a0c1000800020001000000180007000c0003000000982d0f668ec6cda7000001000000080001006e060000264c036d40d678b700c77debfc9ce8ca347191e4cd869600002cf4a773c0c7c8a65c5d0a446fa6c85777d21a9b7165816b70088a26c7acd3d1614baa2eb28c09b1cc4bde3423d55d1022b534ededbd8a1f920008040fcd5966db9f8f95"], 0x1}, 0x1, 0x0, 0x0, 0x4004050}, 0x95) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000380)={@empty, r4}, 0x14) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = socket(0x0, 0x6, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000008c0), 0x0) accept4$unix(r5, &(0x7f00000005c0)=@abs, &(0x7f0000000540)=0x6e, 0x800) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000000), 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$llc_int(r6, 0x10c, 0x9, &(0x7f0000000040)=0x9, 0x4) sendto$llc(r6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x200000000304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) setsockopt$sock_timeval(r6, 0x1, 0x14, &(0x7f0000000080)={0x0, 0x2710}, 0x10) recvmmsg(r6, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f000000c500)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x5, 0x0, 0x0, 0x7d48bddc}, 0x100000001}, {{0x0, 0x0, &(0x7f000000c700)=[{&(0x7f000000c680)=""/90, 0x5a}], 0x1, &(0x7f0000000640)=""/16, 0x10, 0x7f}, 0x200}, {{&(0x7f000000c780)=@ethernet, 0x80, &(0x7f000000ca00)=[{&(0x7f000000c800)=""/210, 0xd2}, {&(0x7f000000c900)=""/92, 0x5c}, {&(0x7f000000c980)=""/82, 0x52}], 0x3, &(0x7f000000ca40)=""/40, 0x28}, 0x206}, {{&(0x7f000000ca80)=@pppol2tpv3in6, 0x80, &(0x7f000000cd00)=[{&(0x7f000000cb00)=""/255, 0xff}, {&(0x7f000000cc00)}, {&(0x7f000000cc40)=""/180, 0xb4}], 0x3, &(0x7f0000000580)=""/5, 0x5, 0x2}, 0xffffffff}], 0x5, 0x1c, 0x0) 10:34:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x90\x1c', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x800, 0x800) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0xfffffffffffffffa, 0x7, 0x7fffffff, 0xff, 0x1a, 0x6, 0x6, 0x1, 0xfffffffffffffffa, 0x7c}) clock_adjtime(0x0, &(0x7f00000006c0)={0x13, 0x0, 0x0, 0x0, 0x0, 0xff}) 10:34:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\xb0\x1e', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:17 executing program 3: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000000)='qnx6\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) pipe(&(0x7f0000000100)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0xffffffff, 0x1, "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", 0x96, 0x0, 0x7, 0xffffffffffffffff, 0x36231f45, 0x80000001, 0xfff, 0x1}, r3}}, 0x128) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video1\x00', 0x2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:17 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x0, 0x40000000}, {0x80000006}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000005c0)="c0dca5055e0bcfec7be070") sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x6beae7b, 0x0) 10:34:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:17 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9205, 0x0) 10:34:17 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400, 0x400000) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x80000) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10d001) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 10:34:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x42}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x101900) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000000c0)={'syz_tun\x00', 0x5df3d96e}) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a9995829c0d15dd7f3371fcf11a3b6fb56ec3379152b81823719163759deca19fdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0d382f68c7daedbddd044666b29c5303838944233e41b6bd1ac9496c40279944c3b7b59ba9adb2c98ef7f07818635f1b1d28d9448af3a97f08eef1bcf07b30811bfdf0e8999318022825679652f6a561d00679cc4d182a608861a18cb8b145ae1") read(r1, &(0x7f0000009f9c)=""/100, 0x64) 10:34:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1102.120476][T17519] [ 1102.122870][T17519] ===================================================== [ 1102.129802][T17519] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 1102.131212][T17517] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1102.137295][T17519] 5.2.0-rc5-next-20190617 #16 Not tainted [ 1102.137300][T17519] ----------------------------------------------------- [ 1102.137318][T17519] syz-executor.1/17519 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 1102.137325][T17519] 000000002f17cce7 (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_read+0x540/0x1940 [ 1102.177142][T17519] [ 1102.177142][T17519] and this task is already holding: [ 1102.184623][T17519] 0000000028a0add8 (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 1102.193254][T17519] which would create a new lock dependency: [ 1102.199143][T17519] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 1102.206361][T17519] [ 1102.206361][T17519] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 1102.215812][T17519] (&(&ctx->ctx_lock)->rlock){..-.} [ 1102.215825][T17519] [ 1102.215825][T17519] ... which became SOFTIRQ-irq-safe at: [ 1102.228721][T17519] lock_acquire+0x16f/0x3f0 [ 1102.233333][T17519] _raw_spin_lock_irq+0x60/0x80 [ 1102.238270][T17519] free_ioctx_users+0x2d/0x490 [ 1102.243125][T17519] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 1102.249364][T17519] rcu_core+0xba5/0x1500 [ 1102.253690][T17519] __do_softirq+0x25c/0x94c [ 1102.258283][T17519] irq_exit+0x180/0x1d0 [ 1102.262535][T17519] smp_apic_timer_interrupt+0x13b/0x550 [ 1102.268249][T17519] apic_timer_interrupt+0xf/0x20 [ 1102.273286][T17519] lock_acquire+0x1ea/0x3f0 [ 1102.277962][T17519] __might_fault+0x15e/0x1e0 [ 1102.282635][T17519] _copy_from_user+0x30/0x1a0 [ 1102.287397][T17519] get_timespec64+0x7d/0x270 [ 1102.292073][T17519] __x64_sys_nanosleep+0xb6/0x220 [ 1102.297178][T17519] do_syscall_64+0xfd/0x680 [ 1102.301769][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.307745][T17519] [ 1102.307745][T17519] to a SOFTIRQ-irq-unsafe lock: [ 1102.314858][T17519] (&ctx->fault_pending_wqh){+.+.} [ 1102.314872][T17519] [ 1102.314872][T17519] ... which became SOFTIRQ-irq-unsafe at: [ 1102.327849][T17519] ... [ 1102.327875][T17519] lock_acquire+0x16f/0x3f0 [ 1102.335054][T17519] _raw_spin_lock+0x2f/0x40 [ 1102.339660][T17519] userfaultfd_release+0x4ca/0x710 [ 1102.344859][T17519] __fput+0x2ff/0x890 [ 1102.348928][T17519] ____fput+0x16/0x20 [ 1102.352997][T17519] task_work_run+0x145/0x1c0 [ 1102.357683][T17519] exit_to_usermode_loop+0x273/0x2c0 [ 1102.363061][T17519] do_syscall_64+0x58e/0x680 [ 1102.367743][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.373714][T17519] [ 1102.373714][T17519] other info that might help us debug this: [ 1102.373714][T17519] [ 1102.383938][T17519] Chain exists of: [ 1102.383938][T17519] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 1102.383938][T17519] [ 1102.398176][T17519] Possible interrupt unsafe locking scenario: [ 1102.398176][T17519] [ 1102.406512][T17519] CPU0 CPU1 [ 1102.411879][T17519] ---- ---- [ 1102.417252][T17519] lock(&ctx->fault_pending_wqh); [ 1102.422376][T17519] local_irq_disable(); [ 1102.429212][T17519] lock(&(&ctx->ctx_lock)->rlock); [ 1102.437283][T17519] lock(&ctx->fd_wqh); [ 1102.443954][T17519] [ 1102.447402][T17519] lock(&(&ctx->ctx_lock)->rlock); [ 1102.452852][T17519] [ 1102.452852][T17519] *** DEADLOCK *** [ 1102.452852][T17519] [ 1102.461005][T17519] 1 lock held by syz-executor.1/17519: [ 1102.466827][T17519] #0: 0000000028a0add8 (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 1102.475976][T17519] [ 1102.475976][T17519] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 1102.486392][T17519] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 1102.492053][T17519] IN-SOFTIRQ-W at: [ 1102.496131][T17519] lock_acquire+0x16f/0x3f0 [ 1102.502561][T17519] _raw_spin_lock_irq+0x60/0x80 [ 1102.509245][T17519] free_ioctx_users+0x2d/0x490 [ 1102.515847][T17519] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 1102.523834][T17519] rcu_core+0xba5/0x1500 [ 1102.529909][T17519] __do_softirq+0x25c/0x94c [ 1102.536245][T17519] irq_exit+0x180/0x1d0 [ 1102.542411][T17519] smp_apic_timer_interrupt+0x13b/0x550 [ 1102.549779][T17519] apic_timer_interrupt+0xf/0x20 [ 1102.556631][T17519] lock_acquire+0x1ea/0x3f0 [ 1102.562974][T17519] __might_fault+0x15e/0x1e0 [ 1102.569400][T17519] _copy_from_user+0x30/0x1a0 [ 1102.575914][T17519] get_timespec64+0x7d/0x270 [ 1102.582331][T17519] __x64_sys_nanosleep+0xb6/0x220 [ 1102.589191][T17519] do_syscall_64+0xfd/0x680 [ 1102.595536][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.603339][T17519] INITIAL USE at: [ 1102.607326][T17519] lock_acquire+0x16f/0x3f0 [ 1102.613579][T17519] _raw_spin_lock_irq+0x60/0x80 [ 1102.620171][T17519] free_ioctx_users+0x2d/0x490 [ 1102.626672][T17519] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 1102.634565][T17519] rcu_core+0xba5/0x1500 [ 1102.640553][T17519] __do_softirq+0x25c/0x94c [ 1102.646800][T17519] irq_exit+0x180/0x1d0 [ 1102.652706][T17519] smp_apic_timer_interrupt+0x13b/0x550 [ 1102.660001][T17519] apic_timer_interrupt+0xf/0x20 [ 1102.666691][T17519] lock_acquire+0x1ea/0x3f0 [ 1102.672931][T17519] __might_fault+0x15e/0x1e0 [ 1102.679265][T17519] _copy_from_user+0x30/0x1a0 [ 1102.685686][T17519] get_timespec64+0x7d/0x270 [ 1102.692099][T17519] __x64_sys_nanosleep+0xb6/0x220 [ 1102.698865][T17519] do_syscall_64+0xfd/0x680 [ 1102.705110][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.712727][T17519] } [ 1102.715366][T17519] ... key at: [] __key.53594+0x0/0x40 [ 1102.722912][T17519] ... acquired at: [ 1102.726829][T17519] _raw_spin_lock+0x2f/0x40 [ 1102.731510][T17519] io_submit_one+0xefa/0x2ef0 [ 1102.736446][T17519] __x64_sys_io_submit+0x1bd/0x570 [ 1102.741730][T17519] do_syscall_64+0xfd/0x680 [ 1102.746495][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.752544][T17519] [ 1102.754858][T17519] -> (&ctx->fd_wqh){....} { [ 1102.759447][T17519] INITIAL USE at: [ 1102.763348][T17519] lock_acquire+0x16f/0x3f0 [ 1102.769421][T17519] _raw_spin_lock_irqsave+0x95/0xcd [ 1102.776187][T17519] __wake_up_common_lock+0xc7/0x190 [ 1102.783121][T17519] __wake_up+0xe/0x10 [ 1102.788761][T17519] userfaultfd_release+0x528/0x710 [ 1102.795467][T17519] __fput+0x2ff/0x890 [ 1102.801037][T17519] ____fput+0x16/0x20 [ 1102.806593][T17519] task_work_run+0x145/0x1c0 [ 1102.812758][T17519] exit_to_usermode_loop+0x273/0x2c0 [ 1102.819628][T17519] do_syscall_64+0x58e/0x680 [ 1102.825891][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.833344][T17519] } [ 1102.835857][T17519] ... key at: [] __key.46263+0x0/0x40 [ 1102.843314][T17519] ... acquired at: [ 1102.847224][T17519] lock_acquire+0x16f/0x3f0 [ 1102.851913][T17519] _raw_spin_lock+0x2f/0x40 [ 1102.856594][T17519] userfaultfd_read+0x540/0x1940 [ 1102.861717][T17519] __vfs_read+0x8a/0x110 [ 1102.866135][T17519] vfs_read+0x1f0/0x440 [ 1102.870475][T17519] ksys_read+0x14f/0x290 [ 1102.874892][T17519] __x64_sys_read+0x73/0xb0 [ 1102.879595][T17519] do_syscall_64+0xfd/0x680 [ 1102.884272][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.890338][T17519] [ 1102.892656][T17519] [ 1102.892656][T17519] the dependencies between the lock to be acquired [ 1102.892662][T17519] and SOFTIRQ-irq-unsafe lock: [ 1102.906374][T17519] -> (&ctx->fault_pending_wqh){+.+.} { [ 1102.911830][T17519] HARDIRQ-ON-W at: [ 1102.915815][T17519] lock_acquire+0x16f/0x3f0 [ 1102.923460][T17519] _raw_spin_lock+0x2f/0x40 [ 1102.933642][T17519] userfaultfd_release+0x4ca/0x710 [ 1102.940412][T17519] __fput+0x2ff/0x890 [ 1102.948180][T17519] ____fput+0x16/0x20 [ 1102.953999][T17519] task_work_run+0x145/0x1c0 [ 1102.960254][T17519] exit_to_usermode_loop+0x273/0x2c0 [ 1102.967206][T17519] do_syscall_64+0x58e/0x680 [ 1102.973462][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1102.980998][T17519] SOFTIRQ-ON-W at: [ 1102.985023][T17519] lock_acquire+0x16f/0x3f0 [ 1102.991301][T17519] _raw_spin_lock+0x2f/0x40 [ 1102.997474][T17519] userfaultfd_release+0x4ca/0x710 [ 1103.004244][T17519] __fput+0x2ff/0x890 [ 1103.009888][T17519] ____fput+0x16/0x20 [ 1103.015516][T17519] task_work_run+0x145/0x1c0 [ 1103.021781][T17519] exit_to_usermode_loop+0x273/0x2c0 [ 1103.028836][T17519] do_syscall_64+0x58e/0x680 [ 1103.035182][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.042746][T17519] INITIAL USE at: [ 1103.046652][T17519] lock_acquire+0x16f/0x3f0 [ 1103.056499][T17519] _raw_spin_lock+0x2f/0x40 [ 1103.062568][T17519] userfaultfd_release+0x4ca/0x710 [ 1103.069256][T17519] __fput+0x2ff/0x890 [ 1103.074808][T17519] ____fput+0x16/0x20 [ 1103.080364][T17519] task_work_run+0x145/0x1c0 [ 1103.086736][T17519] exit_to_usermode_loop+0x273/0x2c0 [ 1103.093594][T17519] do_syscall_64+0x58e/0x680 [ 1103.099759][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.107204][T17519] } [ 1103.109736][T17519] ... key at: [] __key.46260+0x0/0x40 [ 1103.117186][T17519] ... acquired at: [ 1103.121001][T17519] lock_acquire+0x16f/0x3f0 [ 1103.125683][T17519] _raw_spin_lock+0x2f/0x40 [ 1103.130380][T17519] userfaultfd_read+0x540/0x1940 [ 1103.135656][T17519] __vfs_read+0x8a/0x110 [ 1103.140077][T17519] vfs_read+0x1f0/0x440 [ 1103.144414][T17519] ksys_read+0x14f/0x290 [ 1103.148837][T17519] __x64_sys_read+0x73/0xb0 [ 1103.153686][T17519] do_syscall_64+0xfd/0x680 [ 1103.158364][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.164419][T17519] [ 1103.166738][T17519] [ 1103.166738][T17519] stack backtrace: [ 1103.172643][T17519] CPU: 0 PID: 17519 Comm: syz-executor.1 Not tainted 5.2.0-rc5-next-20190617 #16 [ 1103.181772][T17519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.191918][T17519] Call Trace: [ 1103.195245][T17519] dump_stack+0x172/0x1f0 [ 1103.199591][T17519] check_irq_usage.cold+0x5b4/0x72e [ 1103.204793][T17519] ? __kernel_text_address+0xd/0x40 [ 1103.210006][T17519] ? check_usage_forwards+0x330/0x330 [ 1103.215393][T17519] ? check_path+0x26/0x40 [ 1103.219732][T17519] ? check_noncircular+0x132/0x3a0 [ 1103.224936][T17519] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1103.230841][T17519] ? print_circular_bug+0x200/0x200 [ 1103.236059][T17519] ? is_dynamic_key+0x1c0/0x1c0 [ 1103.240926][T17519] ? __lockdep_reset_lock+0x450/0x450 [ 1103.246320][T17519] ? __x64_sys_ioctl+0x73/0xb0 [ 1103.251274][T17519] __lock_acquire+0x2430/0x4af0 [ 1103.256134][T17519] ? __lock_acquire+0x2430/0x4af0 [ 1103.261163][T17519] ? debug_smp_processor_id+0x3c/0x2b0 [ 1103.266630][T17519] ? mark_held_locks+0xf0/0xf0 [ 1103.271404][T17519] lock_acquire+0x16f/0x3f0 [ 1103.275912][T17519] ? userfaultfd_read+0x540/0x1940 [ 1103.281031][T17519] _raw_spin_lock+0x2f/0x40 [ 1103.285530][T17519] ? userfaultfd_read+0x540/0x1940 [ 1103.290644][T17519] userfaultfd_read+0x540/0x1940 [ 1103.295589][T17519] ? __fget+0x35d/0x560 [ 1103.300022][T17519] ? userfaultfd_event_wait_completion+0xa90/0xa90 [ 1103.306539][T17519] ? fsnotify_first_mark+0x210/0x210 [ 1103.311924][T17519] ? __fget+0x384/0x560 [ 1103.316088][T17519] ? wake_up_q+0xf0/0xf0 [ 1103.320351][T17519] ? security_file_permission+0x8f/0x380 [ 1103.326257][T17519] __vfs_read+0x8a/0x110 [ 1103.330510][T17519] ? userfaultfd_event_wait_completion+0xa90/0xa90 [ 1103.337014][T17519] vfs_read+0x1f0/0x440 [ 1103.341178][T17519] ksys_read+0x14f/0x290 [ 1103.345417][T17519] ? kernel_write+0x120/0x120 [ 1103.350101][T17519] ? do_syscall_64+0x26/0x680 [ 1103.354786][T17519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.360855][T17519] ? do_syscall_64+0x26/0x680 [ 1103.365543][T17519] __x64_sys_read+0x73/0xb0 [ 1103.370048][T17519] do_syscall_64+0xfd/0x680 [ 1103.374568][T17519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1103.380466][T17519] RIP: 0033:0x4592c9 [ 1103.384373][T17519] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1103.403980][T17519] RSP: 002b:00007fb47c82dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1103.412682][T17519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 10:34:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1103.420661][T17519] RDX: 0000000000000064 RSI: 0000000020009f9c RDI: 0000000000000004 [ 1103.428720][T17519] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1103.437061][T17519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb47c82e6d4 [ 1103.445030][T17519] R13: 00000000004c53aa R14: 00000000004db138 R15: 00000000ffffffff [ 1103.465802][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env 10:34:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1103.470959][T17517] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1103.480174][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1103.538928][T17517] Error parsing options; rc = [-22] [ 1103.542588][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1103.593023][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1103.645936][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1103.690281][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1103.770113][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1103.777324][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:34:19 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9205, 0x0) 10:34:19 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) sched_getparam(r0, &(0x7f0000000280)) wait4(0x0, 0x0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffff, 0x200) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x101102, 0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x5, r2, &(0x7f0000000140)="0ccc8c75deb239272be5488069bfd5cb75cd239ea70292aa6018bcbeadb437feebb1841e9082fddd820377f5e2b92c4fe22f954a2eed733d1a8dc9cf1b9cf291361f8715d2050f44c2f7ea019bb63f3fab", 0x51, 0x2, 0x0, 0x0, r3}]) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1103.813303][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1103.864188][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1103.885038][T17643] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1103.916859][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [ 1103.937907][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1103.938747][T17643] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1103.960600][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1103.969067][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1104.001384][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1104.020137][T17643] Error parsing options; rc = [-22] [ 1104.020843][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1104.084671][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1104.098907][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1104.145754][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [ 1104.165019][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:34:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x42}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x101900) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000000c0)={'syz_tun\x00', 0x5df3d96e}) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a9995829c0d15dd7f3371fcf11a3b6fb56ec3379152b81823719163759deca19fdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0d382f68c7daedbddd044666b29c5303838944233e41b6bd1ac9496c40279944c3b7b59ba9adb2c98ef7f07818635f1b1d28d9448af3a97f08eef1bcf07b30811bfdf0e8999318022825679652f6a561d00679cc4d182a608861a18cb8b145ae1") read(r1, &(0x7f0000009f9c)=""/100, 0x64) 10:34:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:20 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1104.369117][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1104.376325][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1104.392469][T17760] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00U', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1104.415449][T17760] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1104.455560][T17760] Error parsing options; rc = [-22] [ 1104.500321][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1104.507533][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00U', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:20 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) [ 1104.569785][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1104.594820][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1104.625910][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1104.640274][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:34:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) 10:34:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1104.682978][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1104.699091][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1104.739858][T17887] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1104.776239][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env 10:34:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1104.778766][T17887] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1104.789678][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:34:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1104.854960][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1104.863793][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1104.885771][T17887] Error parsing options; rc = [-22] [ 1104.896175][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env 10:34:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) [ 1104.932817][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:20 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x440001, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x5) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'yam0\x00', 0x3}) 10:34:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1104.982910][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1104.990404][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1105.002453][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1105.016794][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:34:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1105.067819][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.110357][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) 10:34:21 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.155644][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1105.164270][T18017] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1105.193908][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:21 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.216597][T18017] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1105.253644][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1105.278004][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1105.293716][T18017] Error parsing options; rc = [-22] [ 1105.316034][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) [ 1105.344262][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:34:21 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28, 0x2) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80002, 0x0) recvfrom$inet(r1, &(0x7f0000000100)=""/251, 0xfb, 0x100, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x80000000000000, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:21 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1105.425680][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1105.450001][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1105.504320][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1105.526361][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:21 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.575980][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1105.593808][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1105.609433][T18149] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.639721][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1105.649257][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1105.663723][T18149] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1105.688313][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1105.707577][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1105.722355][T18149] Error parsing options; rc = [-22] [ 1105.736925][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) 10:34:21 executing program 3: unshare(0x40600) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:21 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.768139][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1105.807892][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env 10:34:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.842055][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1105.867739][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() dup(0xffffffffffffffff) [ 1105.885716][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:21 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.920321][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1105.940097][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1105.970242][T18275] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1105.989690][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1106.005455][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) getgid() [ 1106.038840][T18275] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1106.071497][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1106.073993][T18275] Error parsing options; rc = [-22] 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1106.114111][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1106.166398][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env 10:34:22 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 10:34:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1106.206571][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1106.225851][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1106.248924][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) [ 1106.265203][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1106.297175][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1106.339561][T18407] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1106.353628][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1106.364492][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1106.378771][T18407] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1106.384744][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1106.413774][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1106.417370][T18407] Error parsing options; rc = [-22] [ 1106.426626][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env 10:34:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) r0 = socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000340)=""/249, 0x100}) 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) [ 1106.450455][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1106.471614][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1106.502591][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1106.535467][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env 10:34:22 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) write$eventfd(r0, &(0x7f00000001c0)=0x7fc5, 0x8) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) wait4(r1, &(0x7f0000000040), 0x20000000, &(0x7f0000000100)) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1106.556115][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1106.582115][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) [ 1106.599448][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1106.611761][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1106.619172][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', 0x0}) [ 1106.655322][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1106.685934][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1106.687040][T18530] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1106.725246][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1106.760293][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) [ 1106.776627][T18530] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1106.790830][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1106.799580][T18530] Error parsing options; rc = [-22] [ 1106.811678][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', 0x0}) [ 1106.852345][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1106.878805][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1106.914044][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1106.931762][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:34:22 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000180)={0x4, 0x7, 0x80000001, 0x3}) wait4(0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fstat(r2, &(0x7f0000000100)) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1106.958062][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1106.983245][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', 0x0}) 10:34:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x0f', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) fstat(0xffffffffffffffff, 0x0) 10:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1107.051466][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1107.062168][T18658] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1107.089667][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1107.111851][T18658] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1107.132682][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1107.164784][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1107.165268][T18658] Error parsing options; rc = [-22] 10:34:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam}) 10:34:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) 10:34:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1107.217799][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1107.240244][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1107.278879][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1107.313661][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:23 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_open_procfs(r0, &(0x7f0000000040)='net/mcfilter\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam}) [ 1107.347745][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1107.382259][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1107.450558][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [ 1107.457787][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1107.459920][T18788] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1107.485232][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env 10:34:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 10:34:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\xff\xef\xff', &(0x7f0000000000)=@ethtool_ringparam}) [ 1107.527786][T18788] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1107.533473][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1107.541849][T18788] Error parsing options; rc = [-22] 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:23 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) getitimer(0x0, &(0x7f0000000040)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='romfs\x00', 0x0, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=,`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl\xb5;-\xbf\a:\xd9\x85$\x1d\xa1\xe31\x05\xf0\xa6s\xc0Vyw\xb61OQ\xf0\xa7x\xa1\x9a\x19\xde\xc7IC\'\x91\x14\x16\x14\x0ei\x8b\x02\rK\x98\xca\n\x02\xf7\x9b\xd7\x86\x1c\x05\x16\xbf\xe6]#\r\xc6\xa4<\x11\xe9\x95\xe0{\x00\x00\x00\x00\x00\x00\x00\x00\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 1107.603247][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1107.636612][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) 10:34:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1107.704985][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1107.732935][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1107.768208][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1107.785637][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x7f', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1107.823419][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1107.835431][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1107.870829][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1107.891639][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) 10:34:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:23 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80000, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000005c0)={@broadcast, @dev, 0x0}, &(0x7f0000000600)=0xc) sendmsg$inet(r1, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000580)=[{&(0x7f00000004c0)="007a54e5585ef6de6879cc5d7afcf9e78c29026f0d4c783de89cb851b1968f1a71d0da06ce0ba40ccf46158dd0c0adf991bafc5abe29b75d09c4135f5735edbd80bdf4526611aab8812aa047eddc4c7514edbfcc64fe96c8d30e4e3b9dc48daa8fc98199b3f60ebfd43fcde455dc3226ef1755af1ce702f90364ed503709e43d9dd54113226504972eac167bbdcef60085e398e0c06cef0dd35e9b8268ca680d3c8b3e4d11528011eaf4118c36cd839370b8093532", 0xb5}], 0x1, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}, 0x40) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000300)=0x7fff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = inotify_add_watch(r1, &(0x7f0000000440)='./file0\x00', 0x20) inotify_rm_watch(r1, r3) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="747241d89a6f72743d30783030bfaa95e953cfbd53303034652b332c616363", @ANYRESDEC=r4, @ANYBLOB=',debug=0x0000000000000002,debug=0x000000000000004f,subj_user=ecryptfs\x00,\x00']) [ 1107.930199][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1107.953689][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1107.971677][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env 10:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 1107.984275][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1107.997013][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [ 1108.013057][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:34:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00`', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1108.071413][T19033] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1108.072436][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1108.117638][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1108.131892][T19033] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1108.146713][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1108.188465][T19033] Error parsing options; rc = [-22] [ 1108.193931][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\xa0', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1108.235970][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1108.253585][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1108.269957][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) [ 1108.277142][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1108.292406][ T3880] kobject: 'loop1' (00000000651fee6a): kobject_uevent_env [ 1108.311705][ T3880] kobject: 'loop1' (00000000651fee6a): fill_kobj_path: path = '/devices/virtual/block/loop1' 10:34:24 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='bdev\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = socket(0x10, 0x80007, 0x5) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) getpeername$ax25(r1, &(0x7f0000000640)={{0x3, @null}, [@default, @bcast, @remote, @bcast, @netrom, @bcast, @remote, @null]}, &(0x7f0000000000)=0x48) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000440)=""/66) wait4(0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000240)=""/126, &(0x7f00000002c0)=0x7e) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f00000006c0)={0x0, 0xd8, &(0x7f0000000800)="10766ab806e8c282786c376c030b42bee47abb6119e79b5d8993af9aaf8caba0faeb1f3354575556cd63f7187baeb4bf3b30d36f2719964b10371a9595e824b6447e7f5b78ea9260f3aeeaa882c7617093b6d0f0d255a409882a87c5f2ce13de9b36412234ccd5d60818665ff86cf1408f7a1a62fbb4b10cfbfb4a43e045e3af431d38ddeba88109adee92749eca949a3d96cc2dc13ccf7a457f0f09851c6b0a1e1a4a60e1dd735ea3db6a220ddf60c3ed7579728f33da39aec789b6e1a0471dd7ef02867c74ae2b5b31b0f01095640556fce60021cdedda"}) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f00000005c0)) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000140)={0x8001, 0x3}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=r0, 0x12) 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1108.332606][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1108.341420][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1108.356276][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1108.384667][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) [ 1108.431881][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1108.460727][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1108.495788][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [ 1108.530568][ T3880] kobject: 'loop3' (00000000ff567679): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1108.591916][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env [ 1108.617525][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:34:24 executing program 3: unshare(0x40600) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x5, &(0x7f00000005c0)=[{&(0x7f00000001c0)="dda76d10dac139bb5a45b551934b409e81dd5eb28f67a4f10e3ba728dd031ae5deeb13e2615b69a054f7a6d25c3ed3b581e311e3e01643aba473685c104d8dd63ebf70a6e1ddad1b5de251d36d5365a0a3f832496ef2aab70dac98461a4f6b94295f6a3735993b5d34e1ebed53036caaa3f8628a6985c0c0cae07dcdb4af9b9b516bc07cf24166102c0f6fe73a936954f73fc5d8a71c2055db2bc50861e371cea99167832fa708143620e5d365a1b3cefbfcf322fe23f2eca4f08a9d8447e2ec93e88880f655b11ef7b848b25cd45f58ed3586d0618dcd1059ad7be1f0623115c1e9ca2dc6a56003d0b82cef8095ca", 0xef, 0xbd09}, {&(0x7f00000002c0), 0x0, 0x3}, {&(0x7f0000000440)="efce6d8abacb6ae74b3952a1d380b51d9ee33c8a204048c5df62215bb2658bfe62bad21033420f141b1b07ebcb7994586e1fee1c0f23f2573598eeef332dd63bfd58c00e3c47f49bb409cc61674974d65f8c5d8001b58b0645686088cd8631acd576aef94e75b090b1f52ba8f7f824416ad8e32f5c8e8cf09ac3b0be554ac7869eac61cabae96cc95aa1f63da11fffeb504c66f3e4846c5068a57facd9019c71d39f77551f10e72c2a3c3d0e55b5c13ed0eb8763e42476f3254b6779620813be11d9181d9f0586cad9cc28c2b4e046c44d58517bd015be839c34f7a0f56a84362a7f185d07ce4a49b62e64669fd86e25efc2a4d2e3", 0xf5, 0x7}, {&(0x7f0000000300), 0x0, 0x400}, {&(0x7f0000000540)="39348a58c70707e25a72c9e4862f70bf0901eb38377afb29d0e3e649f6e8e013b4fbf592f1291c2f511a895652571aada402cf135b2156c60e9f2ab2004cccbaaa3bb217fb76d3e24c30fc277e649de6aff46359bb9fb64a56261b4470671fbabd0fd1bb96fcabc96b080e0b8705159e", 0x70, 0x6}], 0x122000, &(0x7f0000000640)='vmnet0wlan0\x00') r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x44, 0x40) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000300)=0x8) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f00000000c0)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 10:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) 10:34:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1108.648349][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1108.661279][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) [ 1108.713869][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1108.722364][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1108.734252][T19277] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1108.753681][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 10:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 1108.766232][T19277] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1108.801848][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 1108.825428][T19277] Error parsing options; rc = [-22] [ 1108.853310][ T3880] kobject: 'loop5' (00000000c12cb4c3): kobject_uevent_env 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1108.876342][ T3880] kobject: 'loop5' (00000000c12cb4c3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1108.896344][ T3880] kobject: 'loop2' (0000000014ff48e1): kobject_uevent_env [ 1108.905062][ T3880] kobject: 'loop2' (0000000014ff48e1): fill_kobj_path: path = '/devices/virtual/block/loop2' 10:34:24 executing program 3: unshare(0x40600) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x14000f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 10:34:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) 10:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, [{}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:34:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), 0x0) socket$inet6(0xa, 0x100001005, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8000200000000000000063b06ce4aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) [ 1108.977984][ T3880] kobject: 'loop4' (00000000fdb9e126): kobject_uevent_env [ 1109.011200][ T3880] kobject: 'loop4' (00000000fdb9e126): fill_kobj_path: path = '/devices/virtual/block/loop4' 10:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xf}}) 10:34:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) [ 1109.048377][ T3880] kobject: 'loop0' (00000000dff3ec54): kobject_uevent_env [ 1109.061594][T19403] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 1109.071578][ T3880] kobject: 'loop0' (00000000dff3ec54): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:34:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1109.106587][ T3880] kobject: 'loop3' (00000000ff567679): kobject_uevent_env [