[ 95.879418] audit: type=1800 audit(1552593587.931:25): pid=10581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 95.898636] audit: type=1800 audit(1552593587.941:26): pid=10581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 95.918223] audit: type=1800 audit(1552593587.961:27): pid=10581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 97.149367] sshd (10647) used greatest stack depth: 54176 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 99.896154] sshd (10718) used greatest stack depth: 54160 bytes left Warning: Permanently added '10.128.0.104' (ECDSA) to the list of known hosts. 2019/03/14 20:00:02 fuzzer started 2019/03/14 20:00:08 dialing manager at 10.128.0.26:36627 2019/03/14 20:00:08 syscalls: 1 2019/03/14 20:00:08 code coverage: enabled 2019/03/14 20:00:08 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/14 20:00:08 extra coverage: extra coverage is not supported by the kernel 2019/03/14 20:00:08 setuid sandbox: enabled 2019/03/14 20:00:08 namespace sandbox: enabled 2019/03/14 20:00:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/14 20:00:08 fault injection: enabled 2019/03/14 20:00:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/14 20:00:08 net packet injection: enabled 2019/03/14 20:00:08 net device setup: enabled 20:03:22 executing program 0: [ 311.114951] IPVS: ftp: loaded support on port[0] = 21 [ 311.274002] chnl_net:caif_netlink_parms(): no params data found [ 311.350144] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.356870] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.365590] device bridge_slave_0 entered promiscuous mode [ 311.375196] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.381861] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.390228] device bridge_slave_1 entered promiscuous mode [ 311.424712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 311.436319] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 311.470944] team0: Port device team_slave_0 added [ 311.479821] team0: Port device team_slave_1 added [ 311.667778] device hsr_slave_0 entered promiscuous mode [ 311.832970] device hsr_slave_1 entered promiscuous mode [ 312.044734] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.051302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.058615] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.065217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.149901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.171319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.184882] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.195476] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.207802] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 312.227521] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.247211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.255455] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.262095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.310396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.319179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.327392] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.333958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.341793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 312.350999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 312.360315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 312.369210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.377898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 312.386880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.395544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 312.403981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.417331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 312.425609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 312.434057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 312.447929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 312.486116] 8021q: adding VLAN 0 to HW filter on device batadv0 20:03:24 executing program 0: 20:03:24 executing program 0: 20:03:24 executing program 0: 20:03:25 executing program 0: 20:03:25 executing program 0: 20:03:25 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="cf0224623000a3928a9c96f11d402171abbb49592ef6ec9c43d54f5ef40040791b4f2b8be4d9ad15aca154d4c62d49b37fca4c1baaefdff0afd429b5624367234084aaccc979c2b3796eb610d6dd9cc6129a8d025b846e784f3fc94f8d5056", 0x5f}, {&(0x7f0000000140)="a31560ecac06dbae4ec56a5c225c82c0773f12a3f4d2701d1a1cda573616bb92a8feb404b8652fb738f63fe70741814c4f0575e2b27777f1ced6034685816153bc264670dceb614793c5641b7e0f9d90069b3a3062c885cb1806e638a90e62f059933dce2d48388cce2a831feeaf6967d7916bd426793622b5b545bb68bee91cec4411d0", 0x84}], 0x2, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 20:03:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x80000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x9, 0x1}, 0x8) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x98, r3, 0x802, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2537}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3fff8000000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffff93a}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @remote}}}, 0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r2, &(0x7f00000003c0)=0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000400)={r4, 0x800}, 0x8) 20:03:25 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x7, 0x10001, 0x8, 0x93f, 0xbe, 0x4}, 0x1f}, 0xa) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = getgid() setgid(r2) setsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f00000000c0), 0x4) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x0, 0x3, "1c36897b60a9afef3125d5e6977ada24d806960fdd5c3484ee13a89c9d3bd284c575c681f98ddc72a6086ea92b7fc7b34b61e4f7e8f622f6477ae933a16c889a1ceeb87d9ea3ac085a49444b715195f1903f0a0b6277d536c35d4e368cb3bfb382ad07a219cc2aa329"}, 0x79) [ 313.475389] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:03:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='oom_score_adj\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='\x00\x05\x00') exit(0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0xa2, 0x7fff, [], &(0x7f0000000080)=0x10001}) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000280)) sendfile(r0, r2, 0x0, 0x1) sendto$unix(r0, &(0x7f00000001c0)="99ede4f49df903e4fc82730804b8112ef676d8d54dcc2c2bd0bb5cbd8770776d0bbeaadcbe81733a46039220b9bf13539a20b86b607a8ea7fb0db065a60f059d96e47f3075bcb7ee8fd7b5f14da17a50d739f7b392356d6bdbdab750238ccc626f86b5aec81ae06037338587282712", 0x6f, 0x80, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x6) 20:03:26 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000100)={0x62, "9180e50a5fc7aed05e2cfd098e77b0e2cff63214457984e300576727fe59b066", 0x1280, 0x3, 0x9, 0x1, 0x7}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x2, 0x5, 0x63a5, 0x0, r0}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3d, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0x2, 0x1, 0x0, "0f348062d210669f0e613600fa33fac1d718583a70ea62b24d0a0e2e4065af66"}) 20:03:26 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000180)={0xd, 0x1, 0x1ff, "7b9b6b006472b08dfae1ba28be"}) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8, 0x0) tee(r1, r2, 0x6, 0x1) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000200)=""/27, &(0x7f0000000240)=0x1b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$packet_buf(r1, 0x107, 0x1f, &(0x7f00000002c0)=""/26, &(0x7f0000000300)=0x1a) write$cgroup_subtree(r1, &(0x7f0000000340)={[{0x2b, 'memory'}, {0x2b, 'io'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x2f, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'memory'}]}, 0x2d) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000380)=0x2) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000003c0)={0xa, [0x4, 0x4, 0x1000, 0x9, 0x7, 0x8, 0xffffffffffffffac, 0x57cd6b23, 0x3, 0x7]}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x88, r5, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x354bd865}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40855}, 0x4) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000640)={"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"}) accept4$unix(r4, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e, 0x0) getsockname$netlink(r1, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000b80)=0x0) rt_sigqueueinfo(r6, 0x7, &(0x7f0000000bc0)={0x27, 0x7e4, 0x7fffffff}) r7 = syz_open_dev$usbmon(&(0x7f0000000c40)='/dev/usbmon#\x00', 0x7b, 0x2) fsetxattr$security_ima(r4, &(0x7f0000000c80)='security.ima\x00', &(0x7f0000000cc0)=@ng={0x4, 0xc, '`'}, 0x3, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) getpeername$packet(r1, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d40)=0x14) clock_gettime(0x0, &(0x7f0000000dc0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000ec0)={&(0x7f0000000d80)={0x1d, r8}, 0x10, &(0x7f0000000e80)={&(0x7f0000000e00)={0x4, 0x400, 0x65, {0x0, 0x2710}, {r9, r10/1000+30000}, {0x2, 0x2, 0xffff, 0x5}, 0x1, @canfd={{0x2, 0x80000000, 0x0, 0x7}, 0x40, 0x1, 0x0, 0x0, "951d6783eb130538a221c83169c24ddca0416b61d9d55d28d7e46a89eb947bc895ecabe27f75d27a009b55a4f84f066a86ad6e769ce68f611be6154104f0b187"}}, 0x80}, 0x1, 0x0, 0x0, 0x54}, 0x40000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000f00)={'batadv0\x00', 0x2a00}) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000f40)='./file0\x00', 0x400000, 0xc) pwrite64(r11, &(0x7f0000000f80)="2a48dafaf2bff588b4e9d5d4ebbe7a99d4df03a80de3b077622ddd0c8d9a8d3937f8414e", 0x24, 0x0) ioctl$VIDIOC_DQEVENT(r7, 0x80885659, &(0x7f0000000fc0)={0x0, @src_change}) 20:03:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000080)=0x7) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f00000000c0)={0x7, 0x7, 0x7ff, 0x4}) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000000100)=ANY=[@ANYBLOB="38010000100017070000000000ff0f00ff02000000000000000000000000000100000000000000000000ffffac14ffaa08974ef4af16367946e6cbc76a1a1600000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020002006200000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x138}}, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x401, 0x0) [ 314.803826] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 314.816557] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 20:03:26 executing program 0: prlimit64(0x0, 0x9, &(0x7f0000000200), 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb000, 0xffffffffffffffff, &(0x7f0000ff5000/0xb000)=nil) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0x50, &(0x7f0000000180)}, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0x188, &(0x7f00000000c0)={&(0x7f0000000300)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) bind$unix(r1, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) 20:03:27 executing program 0: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0xc, &(0x7f0000000200), &(0x7f00000001c0)=0xfffffffffffffdec) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f00000000c0)=""/51) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000040)={[{0xa7a0, 0x0, 0x6060f650, 0x9, 0x4, 0xe3c, 0x80, 0x3, 0xcd, 0x6, 0x101, 0x3f, 0x7f}, {0x0, 0x6, 0x1, 0x1000, 0xc50, 0x1bc2, 0x92c, 0x4, 0x76f3ffcf, 0x5, 0x3, 0x2, 0x5}, {0x9, 0x1, 0x7ff, 0x55d75532, 0x466d, 0x7, 0x100000000, 0x2, 0xff, 0x80000000, 0xffffffffffffffa3, 0x7, 0x1}], 0xffffffffffffffff}) socket$kcm(0x29, 0x5, 0x0) 20:03:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xa, &(0x7f0000000100)=0x3ff, 0xffffffffffffffa0) syz_emit_ethernet(0xba, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x50, r1, 0xfffffffffffffffc) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x1}) [ 315.343695] IPVS: ftp: loaded support on port[0] = 21 20:03:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80001) write(r0, 0x0, 0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80000001, 0x800) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0xa0, 0x8, @buffer={0x0, 0x3a, &(0x7f0000000100)=""/58}, &(0x7f0000000140)="e1fded3c71596ef36877698f8dbc730b6c035e48465eb4b47ec3f968f944d044d4cd59fc4a6218e35cda8c29dc180923008f0d98504364a6016f5d096186db7218e88531fd166718a8340b3a202e11a67fed3cd2c452aad6e15396cb18d608df28897bd7be3b96b5fcf5d2f12da4fdb3f4d27b9afbaf7750259cdad60519294eeeedb518d2730d4b66e6db5c0d87d48b79b983350b51ea7e113e83a8c10b3c12", &(0x7f0000000200)=""/241, 0x634f, 0x20, 0xffffffffffffffff, &(0x7f0000000300)}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000080)={0x3, 0x10000}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00003bbff4)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x9, 0x7, 0x7a, 0x4}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000c3fff4)={0x40000006}) ioctl$KVM_NMI(r2, 0xae9a) [ 315.574465] chnl_net:caif_netlink_parms(): no params data found [ 315.654114] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.660683] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.669073] device bridge_slave_0 entered promiscuous mode [ 315.680110] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.686743] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.695427] device bridge_slave_1 entered promiscuous mode 20:03:27 executing program 0: r0 = socket(0x10, 0x10000000003, 0x4) recvmsg$kcm(r0, &(0x7f0000001c00)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe3b, &(0x7f0000000700)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000520000000000ff"], 0x28}}, 0x8010) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) setpriority(0x0, r1, 0x100) [ 315.777840] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 315.804763] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 315.864893] team0: Port device team_slave_0 added [ 315.873834] team0: Port device team_slave_1 added [ 315.987764] device hsr_slave_0 entered promiscuous mode [ 316.034573] device hsr_slave_1 entered promiscuous mode [ 316.118067] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.124690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.131949] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.138486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.232325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 316.256009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.266576] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.275978] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.289480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 316.312364] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.333303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.341490] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.348097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.411271] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 316.421240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.439995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.448406] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.455019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.464982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.474227] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.482928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.491601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.502798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 316.510368] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.551139] 8021q: adding VLAN 0 to HW filter on device batadv0 20:03:28 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000180)={0xd, 0x1, 0x1ff, "7b9b6b006472b08dfae1ba28be"}) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8, 0x0) tee(r1, r2, 0x6, 0x1) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f0000000200)=""/27, &(0x7f0000000240)=0x1b) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$packet_buf(r1, 0x107, 0x1f, &(0x7f00000002c0)=""/26, &(0x7f0000000300)=0x1a) write$cgroup_subtree(r1, &(0x7f0000000340)={[{0x2b, 'memory'}, {0x2b, 'io'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x2f, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'memory'}]}, 0x2d) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000380)=0x2) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000003c0)={0xa, [0x4, 0x4, 0x1000, 0x9, 0x7, 0x8, 0xffffffffffffffac, 0x57cd6b23, 0x3, 0x7]}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x200, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x88, r5, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x354bd865}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40855}, 0x4) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000640)={"207ed26da6cc380c40c813bf4e544282757f9283e497f5a492cf62979feaa298647da9e286ea85c4946eb162b8ab3027b18ed9d2cca249febc01144207e166f534507bb8b99a9ac2f908ee6560449239ff871b50c21508a62439c14443bf3eaa1d15eb4bcbbe2542686e2d3aa436e99c2e5d2e8776b780f9e4ed5597a37e67338d0a7dee6950cd9f7e912faa7c95539e5c1ef19bfc29cc64b73dc4040f6770f868d435afc7249f2089fd53f9ab8bd91d2cdde5946243082e83c226ceacab86a592e85099cb37b9fa51d8bf45d3d3588d0d2f1d3d38a2684f0c273037e8035dcbb24b43264d5bd6aa16f69287bc58e4f628c27c08fde6b068617fb0b252cdafd4537627c5ec6d8ef7ac5f4feeae18416f0dd10ccc4e61f4f7fa3edb7a019c4b5588cd7cf5b7a71deb7eb3e38bf745962c34fdb20664dd646676d58928b2b9a274902295f6dbac98af3f4c7692faf1d92749ef690bc19a1df4d014327a0fa9fd8eb89f85faadbdb429e6d59c97641a50be246375e08ce734984e02e6f1015701d0ecc8d7f5af575fdde1bd6189da79910a7773c8e9cf91a716e7deaa9c03f7e5fc280d33a6497bb3356685e86db9ae8753fe3408c727823543e6b34d475172ba04e410482e9c04bb708d31ddb21ef64e72aac45c487d1831335258af4524433c213277d4c02af28910bd31ffacd70f94d6e821e6541cd25f361b58cb5a1e420dc73e65913affa9bf9eb1f0772f86fa2751ebada3511ab5c41fb581e61fa42b88ff7548536dd896b713e8a3f22916b60e09c5d5d91a3a6413a63108ae445d1edae4a8fe0eb2de4626dc85076f4a616f8bdb7891113c3c504829f1b25f23d4058cfaa61b5d10d8faa75dbce3d481cf522c720e4a236a91a26246f8496c3b8106b2b53cce45fbca11abc80600659f9c317eb25ec69ba398f9551cdff6ff686b416fc65af32b82836954a11ed6440ae19531e483445ef6bc5121d86e28c92b2cf858a568ea7fd3864dc49db214eef27d3a0fe9611398bfe51cfda05ee3c88130862adc7c28b3c5984ab7afc582022bda78e299402312d1eaf757404e81350f144807fdaa1ed1ae78bcf3e8336f5276e5f86039a524f9f47e07d84260d8be24db0d9fba3a3b476f88d3af15f775c7baf2fdb9952f92858c1040e5c33a19dadb2c7382c15508fb2676100f2a9dc3906a9d421503a624060c998eae875c36bac2181143df519f57fea9cb48f58841a00d3c15749acbb3e8ab71cdf1a29c985ed51e1aa7b4408a40da11af8de1fadcd464811733e6b3eed5aad82e78229e902817593fa60fd5f3bc765030a895685589fa5a4569b8b6c4feed1da15e24b6515053b4de24ea84093e0bb4707a08ad0bbf2d457db67d08deca0bbbbae513a09905ef497f0afbb13908481645fadf5dbf6ca3fbc290a14f4511825740619f8d6f1f0523bf740a"}) accept4$unix(r4, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e, 0x0) getsockname$netlink(r1, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000b80)=0x0) rt_sigqueueinfo(r6, 0x7, &(0x7f0000000bc0)={0x27, 0x7e4, 0x7fffffff}) r7 = syz_open_dev$usbmon(&(0x7f0000000c40)='/dev/usbmon#\x00', 0x7b, 0x2) fsetxattr$security_ima(r4, &(0x7f0000000c80)='security.ima\x00', &(0x7f0000000cc0)=@ng={0x4, 0xc, '`'}, 0x3, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) getpeername$packet(r1, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d40)=0x14) clock_gettime(0x0, &(0x7f0000000dc0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000ec0)={&(0x7f0000000d80)={0x1d, r8}, 0x10, &(0x7f0000000e80)={&(0x7f0000000e00)={0x4, 0x400, 0x65, {0x0, 0x2710}, {r9, r10/1000+30000}, {0x2, 0x2, 0xffff, 0x5}, 0x1, @canfd={{0x2, 0x80000000, 0x0, 0x7}, 0x40, 0x1, 0x0, 0x0, "951d6783eb130538a221c83169c24ddca0416b61d9d55d28d7e46a89eb947bc895ecabe27f75d27a009b55a4f84f066a86ad6e769ce68f611be6154104f0b187"}}, 0x80}, 0x1, 0x0, 0x0, 0x54}, 0x40000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000f00)={'batadv0\x00', 0x2a00}) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000f40)='./file0\x00', 0x400000, 0xc) pwrite64(r11, &(0x7f0000000f80)="2a48dafaf2bff588b4e9d5d4ebbe7a99d4df03a80de3b077622ddd0c8d9a8d3937f8414e", 0x24, 0x0) ioctl$VIDIOC_DQEVENT(r7, 0x80885659, &(0x7f0000000fc0)={0x0, @src_change}) 20:03:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000027, 0x32, r0, 0xfffffffffffffffc) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x1a, &(0x7f0000000040)={'filter\x00', 0x2, [{}, {}]}, 0x48) close(r2) close(r1) 20:03:28 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) r1 = epoll_create(0xe2fa) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x2007}) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00', 0x4000}) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000100)=0xcf53) 20:03:29 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xd9, 0x4, 0x6, "85803bf8b04f267ec85768dee6e122f9", "9589227b3b1c91e2c7d7075c7ec32cd1ea01ca2e5e57821c4d233faf9368e6364acf99d1c6252fdfbf3f28018d111ff6287623a7a5bda7999d934ae2bbbd43272c08eb4af37abdb3e9f43b98602bc37dadd63896b5dfbb7ef4e6564284b5b35e70def73ca476f755d8eb70d3d97b22dbd4949fd51319067696f8f1a96eae1a83d4c65afc5078c9a4a5512d9dc9f8261785f30dccc414136bcea77834ef99ed334c65f0892e2a278162df6749d1182aca52cae055bad255af3378d1b4d29d37f0d279d15c"}, 0xd9, 0x1) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000440)) 20:03:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) set_tid_address(&(0x7f0000000880)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r5, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x3e15) r6 = fcntl$getown(r0, 0x9) fcntl$lock(r2, 0x25, &(0x7f00000007c0)={0x1, 0x1, 0x1, 0x3f, r6}) 20:03:29 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x10) [ 317.236000] QAT: Invalid ioctl [ 317.270491] QAT: Invalid ioctl 20:03:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) set_tid_address(&(0x7f0000000880)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r5, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x3e15) r6 = fcntl$getown(r0, 0x9) fcntl$lock(r2, 0x25, &(0x7f00000007c0)={0x1, 0x1, 0x1, 0x3f, r6}) 20:03:29 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3ff, 0x80000000800) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000140)={0x0, 0x2}) tee(r0, r0, 0x8, 0xf) [ 317.442008] QAT: Invalid ioctl 20:03:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) set_tid_address(&(0x7f0000000880)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r5, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x3e15) r6 = fcntl$getown(r0, 0x9) fcntl$lock(r2, 0x25, &(0x7f00000007c0)={0x1, 0x1, 0x1, 0x3f, r6}) 20:03:29 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x0, 0x100a}}) r1 = fcntl$getown(r0, 0x9) fcntl$setown(r0, 0x8, r1) [ 317.655638] QAT: Invalid ioctl 20:03:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) set_tid_address(&(0x7f0000000880)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r5, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x3e15) r6 = fcntl$getown(r0, 0x9) fcntl$lock(r2, 0x25, &(0x7f00000007c0)={0x1, 0x1, 0x1, 0x3f, r6}) 20:03:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[]}}, 0x24000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400800) mq_timedreceive(r1, &(0x7f0000000280)=""/46, 0x2e, 0x5, &(0x7f00000002c0)={0x0, 0x1c9c380}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000300)="d2c8885d565107761720ebdfc89daf037ca35f74022119bad0a75f2d3840b66a9c093b0e7e58f32af2f12947fe6c3fc80d9f60456c1a0a95558fd6541967f4ba94c90242eb959543c70324a40b62405fd27034b92b46ea0949631e0448781e79ce2b212f5383043ac8fc4b47474292a4d154beb55cfb64b919b16da210d3e13b16ade601ded0f33af562a0ea12f573dc8b0142226e4e88cb271d882c964d8249d2", 0xa1) pwrite64(r0, &(0x7f0000000180)="80785872ca1aab910da92c9d19ea605cc48e084ac1ef861f0fc001a3f2ef0b9e94cc486e2801859ea87223ae4d12a53ba4d2cd4b306229093cfe112dfc383634db73ea2c9c6424c828affec89082427a8e7102d4cddccdd6147d295aa0a8ce9462c2fa0bd72fa4ea7d7b0ff9cb7d5e6c2ecd9882f643b076bd18883837c7970149616e386aa470d5653c9b52", 0x8c, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) [ 317.918802] QAT: Invalid ioctl 20:03:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x3e15) fcntl$getown(r0, 0x9) 20:03:30 executing program 1: unlink(&(0x7f0000000540)='./file0/file1\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x0, 0x10) name_to_handle_at(r0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4a3f0073ba00000000005af3d77b20e30000fdea1eb189752ad6db3badd30bfedc44ac086f40b20180899d8551077b2c9ad92bd178ad84071e6918adbc7d00942d"], &(0x7f0000000440), 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dhcp_state_t:s0\x00', 0x22, 0x0) setxattr$security_smack_entry(&(0x7f00000004c0)='./file0\x00', &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00', 0x201, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000500)={0x5, 0x0, 0x3, 0x7, 0xffffffff}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x3f, 0x1) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x6) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x10001, 0x24000) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f00000002c0)=""/182) [ 318.113521] QAT: Invalid ioctl 20:03:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x3e15) 20:03:30 executing program 1: unlink(&(0x7f0000000540)='./file0/file1\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x0, 0x10) name_to_handle_at(r0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4a3f0073ba00000000005af3d77b20e30000fdea1eb189752ad6db3badd30bfedc44ac086f40b20180899d8551077b2c9ad92bd178ad84071e6918adbc7d00942d"], &(0x7f0000000440), 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dhcp_state_t:s0\x00', 0x22, 0x0) setxattr$security_smack_entry(&(0x7f00000004c0)='./file0\x00', &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00', 0x201, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000500)={0x5, 0x0, 0x3, 0x7, 0xffffffff}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29, 0x3) r2 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x3f, 0x1) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x6) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x10001, 0x24000) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f00000002c0)=""/182) [ 318.332481] QAT: Invalid ioctl 20:03:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 20:03:30 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x81, 0x800) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000040)=0x2) r2 = epoll_create1(0x0) close(r0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000180)={0x12}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000080)) [ 318.559245] QAT: Invalid ioctl 20:03:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) process_vm_writev(0x0, &(0x7f0000000dc0), 0x1, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/251, 0x1b3}], 0x1, 0x0) 20:03:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020f000010000000000000000000000008001200000001e107000000000000000600000000000b00000000000002000000009a0200da2013d2000000000000040008ada80003000000001fffedff000003000600ff00000002000080ac14ffbbf0000000000000000300050000a77546ea40fe83000000020042732bd7b82000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x271, 0x0) [ 318.725401] QAT: Invalid ioctl 20:03:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000006c0)={0x8001, 0x1, 0x4, 0x100, 0x0, 0x5}) [ 318.896822] QAT: Invalid ioctl 20:03:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x13, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x2000000ff, 0x0, &(0x7f0000000240)=0xd2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=@newqdisc={0x130, 0x24, 0x300, 0x70bd2d, 0x25dfdbfc, {0x0, r2, {0xa, 0x5}, {0xb}, {0xa, 0xffe4}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}, @qdisc_kind_options=@q_pfifo={{0xc, 0x1, 'pfifo\x00'}, {0x8, 0x2, 0x1ff}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3ff}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1c000000}, @TCA_STAB={0xd0, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x8, 0x1f, 0x3f, 0x73, 0x0, 0x7, 0x2, 0xa}}, @TCA_STAB_DATA={0x18, 0x2, [0x4, 0x75e, 0xeaf, 0xfff, 0x9, 0x7, 0x80000001, 0x1f, 0x1]}, @TCA_STAB_BASE={0x1c, 0x1, {0x7, 0x9, 0x8, 0x3, 0x1, 0x7fff, 0x80000001, 0x8}}, @TCA_STAB_DATA={0x18, 0x2, [0x400, 0x3, 0x6, 0xce4, 0x0, 0x1, 0x38, 0x7, 0x8001]}, @TCA_STAB_BASE={0x1c, 0x1, {0x1ba1, 0x9, 0x6, 0x5, 0x2, 0x0, 0x30000000000, 0x3}}, @TCA_STAB_BASE={0x1c, 0x1, {0x1, 0x3, 0x9, 0x2, 0x0, 0x31, 0x8, 0x4}}, @TCA_STAB_DATA={0x10, 0x2, [0x5, 0x6eb9e93b, 0x3, 0x8000, 0x7fff]}, @TCA_STAB_BASE={0x1c, 0x1, {0x1, 0x9, 0x5a96, 0x1, 0x2, 0x3ff, 0x6e8, 0x9}}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x20040000}, 0x44084) 20:03:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r4, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 20:03:31 executing program 1: r0 = socket$inet(0x2, 0x2000002080002, 0x47f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x160, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a80], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]}, 0x1dc) [ 319.102972] QAT: Invalid ioctl 20:03:31 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r3, 0xffffffffffffff94}, 0x2c) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) 20:03:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2000000205, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x50000, 0x0) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4408810}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@newtfilter={0x34, 0x2c, 0x500, 0x70bd28, 0x25dfdbfd, {0x0, r2, {0x2, 0xe}, {0x9, 0xf}, {0x9, 0xf}}, [@TCA_CHAIN={0x8, 0xb, 0x101}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x34}}, 0x40080) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) [ 319.253509] QAT: Invalid ioctl 20:03:31 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x5, 0x80000001, 0x2, 0x1, r3, 0xffffffffffffff94}, 0x2c) 20:03:31 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1072f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/57) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 319.439076] QAT: Invalid ioctl 20:03:31 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fffffff, 0x2) [ 319.497541] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 319.506486] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 319.518972] Error parsing options; rc = [-22] 20:03:31 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1072f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/57) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 319.602665] QAT: Invalid ioctl 20:03:31 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000002c0)={0xae, 0x7, 0x3b, 0x0, 0x1000, 0xfffffffffffff001, 0x6}) [ 319.696060] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 319.705052] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 319.717566] Error parsing options; rc = [-22] [ 319.751203] QAT: Invalid ioctl 20:03:31 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xfffffffffffffff8, 0x300) 20:03:31 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1072f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/57) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 319.909086] QAT: Invalid ioctl 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) [ 319.956424] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 319.965509] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 319.977996] Error parsing options; rc = [-22] 20:03:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1072f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/57) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 320.093113] QAT: Invalid ioctl 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002180)=""/223, 0xdf}], 0x1, &(0x7f0000002340)=""/110, 0x6e}, 0x0) [ 320.186016] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 320.194913] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 320.207464] Error parsing options; rc = [-22] [ 320.281481] QAT: Invalid ioctl 20:03:32 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x1072f00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x14001fd) [ 320.445444] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 320.454395] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 320.466945] Error parsing options; rc = [-22] [ 320.486924] QAT: Invalid ioctl 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x10000, 0x0) 20:03:32 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) set_tid_address(&(0x7f0000000880)) [ 320.675111] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 320.682251] QAT: Invalid ioctl [ 320.684670] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 320.700126] Error parsing options; rc = [-22] 20:03:32 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 320.808079] QAT: Invalid ioctl 20:03:32 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) 20:03:33 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 320.986713] QAT: Invalid ioctl 20:03:33 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000a00)=""/208) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) 20:03:33 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 321.203770] QAT: Invalid ioctl 20:03:33 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) 20:03:33 executing program 1: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 321.393002] QAT: Invalid ioctl 20:03:33 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) 20:03:33 executing program 1: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:33 executing program 1: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:33 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) 20:03:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'netdevsim0\x00', 0x2}, 0x18) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x61a}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x8}, 0x8) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x7, 0x4) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000180)=""/126) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000200)={0x10}) renameat(r0, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000002c0)={0x29}) ftruncate(r0, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x0, 0x4}]}, 0xc, 0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x188, r2, 0x220, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xf8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa67}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5000000000000000, @dev={0xfe, 0x80, [], 0x2a}, 0x101}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3eda, @empty, 0x9}}}}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x8080}, 0x800) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000640)={0x1, {0x0, 0x1c9c380}, 0x3, 0x4}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000680)=0x0) write$FUSE_LK(r0, &(0x7f00000006c0)={0x28, 0x0, 0x4, {{0x100000000, 0x0, 0x3, r3}}}, 0x28) connect$vsock_dgram(r0, &(0x7f0000000700)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000780)=0x4) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000800)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r4, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000900)='trusted.overlay.redirect\x00', &(0x7f0000000940)='./file0\x00', 0x8, 0x3) execve(&(0x7f0000000980)='./file0\x00', &(0x7f0000000a80)=[&(0x7f00000009c0)='system\x00', &(0x7f0000000a00)='netdevsim0\x00', &(0x7f0000000a40)='.L\xe3+\x00'], &(0x7f0000000b40)=[&(0x7f0000000ac0)='eth0cpusetwlan0lonodevem1nodevselfvmnet0\x00', &(0x7f0000000b00)='\x00']) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000b80)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000bc0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c00)={'bpq0\x00', 0x0}) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d00)={{{@in6=@dev={0xfe, 0x80, [], 0x2a}, @in6=@rand_addr="7bb16c245ea840b4e777d07723f6802b", 0x4e23, 0x0, 0x4e21, 0x0, 0x2, 0x20, 0x0, 0x3e, r5, r6}, {0x3, 0xffb9, 0x401, 0x6, 0x67b8, 0x80, 0x9}, {0x9, 0x5, 0x81, 0x6}, 0xe0, 0x6e6bbd, 0x0, 0x1, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1000}, 0x4d6, 0x7f}, 0xa, @in6=@loopback, 0x34ff, 0x2, 0x37203634961e7b69, 0x5, 0x7f, 0x3}}, 0xe8) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000e00)) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000e40)) 20:03:33 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:34 executing program 0: socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f0000000e80)=""/30, 0x1e}], 0x2}}], 0x1, 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) 20:03:34 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:34 executing program 0: socket(0x10, 0x803, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) [ 322.262596] QAT: Invalid ioctl 20:03:34 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:34 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) [ 322.457362] QAT: Invalid ioctl 20:03:34 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) 20:03:34 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 322.754199] IPVS: ftp: loaded support on port[0] = 21 20:03:34 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) 20:03:34 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:35 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) [ 323.027115] chnl_net:caif_netlink_parms(): no params data found [ 323.132219] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.138779] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.147449] device bridge_slave_0 entered promiscuous mode [ 323.177163] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.183868] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.193041] device bridge_slave_1 entered promiscuous mode [ 323.228644] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 323.248810] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 323.283262] team0: Port device team_slave_0 added [ 323.293512] team0: Port device team_slave_1 added [ 323.397027] device hsr_slave_0 entered promiscuous mode [ 323.543912] device hsr_slave_1 entered promiscuous mode [ 323.806184] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.812840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.820026] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.826736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.919822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.944297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.956943] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.966192] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.980649] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 324.003813] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.030146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.039130] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.045739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.053708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.062124] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.068636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.120262] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 324.130092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 324.152453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.162189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.171332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.180324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.190112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.199196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.208194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.216592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.225469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.233945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.244878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.253217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.300038] 8021q: adding VLAN 0 to HW filter on device batadv0 20:03:36 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0x80040000, 0x20000000, [], 0x0}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffff, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) 20:03:36 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:36 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000840)) [ 324.583468] QAT: Invalid ioctl 20:03:36 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) 20:03:36 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:36 executing program 2: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') exit(0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 324.776312] Error parsing options; rc = [-22] 20:03:36 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:36 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) [ 325.020714] Error parsing options; rc = [-22] [ 325.091283] Error parsing options; rc = [-22] 20:03:37 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:37 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000840)) [ 325.249246] Error parsing options; rc = [-22] 20:03:37 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:37 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 325.425415] Error parsing options; rc = [-22] 20:03:37 executing program 1 (fault-call:1 fault-nth:0): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 325.509567] QAT: Invalid ioctl [ 325.591971] FAULT_INJECTION: forcing a failure. [ 325.591971] name failslab, interval 1, probability 0, space 0, times 1 [ 325.603530] CPU: 1 PID: 11077 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 325.610521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.619918] Call Trace: [ 325.622696] dump_stack+0x173/0x1d0 [ 325.626422] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 325.631676] should_fail+0xa19/0xb20 [ 325.635479] __should_failslab+0x278/0x2a0 [ 325.639809] should_failslab+0x29/0x70 [ 325.643764] __kmalloc_track_caller+0x1ce/0xc70 [ 325.648503] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 325.653770] ? ksys_mount+0xc4/0x3d0 [ 325.657556] ? strnlen_user+0x36d/0x490 [ 325.661635] strndup_user+0x154/0x300 [ 325.665509] ksys_mount+0xc4/0x3d0 [ 325.669119] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 325.674396] __se_sys_mount+0xe5/0x110 [ 325.678371] __x64_sys_mount+0x62/0x80 [ 325.682392] do_syscall_64+0xbc/0xf0 [ 325.686245] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.691490] RIP: 0033:0x458079 [ 325.694733] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.713692] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 325.721472] RAX: ffffffffffffffda RBX: 00007f228334cc90 RCX: 0000000000458079 [ 325.728806] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 20:03:37 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 325.736130] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 [ 325.743445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 325.750763] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:37 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 325.839937] Error parsing options; rc = [-22] [ 325.871791] QAT: Invalid ioctl 20:03:38 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:38 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/229) [ 326.094207] QAT: Invalid ioctl [ 326.105651] QAT: Invalid ioctl [ 326.121902] QAT: Invalid ioctl [ 326.125208] QAT: Invalid ioctl 20:03:38 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:38 executing program 1 (fault-call:1 fault-nth:1): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:38 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) poll(&(0x7f0000000100)=[{r0, 0x42b2}, {r0, 0x1}, {r0, 0x140}], 0x3, 0xea) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x701fc629582897e0}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x100000000, 0x8000}) [ 326.386062] FAULT_INJECTION: forcing a failure. [ 326.386062] name failslab, interval 1, probability 0, space 0, times 0 [ 326.397553] CPU: 1 PID: 11097 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 326.404545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.413955] Call Trace: [ 326.416769] dump_stack+0x173/0x1d0 [ 326.420466] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 326.425727] should_fail+0xa19/0xb20 [ 326.429517] __should_failslab+0x278/0x2a0 [ 326.433825] should_failslab+0x29/0x70 [ 326.437794] kmem_cache_alloc_trace+0x125/0xb40 [ 326.442530] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 326.447966] ? copy_mount_options+0xce/0x670 [ 326.452453] copy_mount_options+0xce/0x670 [ 326.456756] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 326.462270] ? strndup_user+0x2e1/0x300 [ 326.466341] ksys_mount+0x251/0x3d0 [ 326.470062] __se_sys_mount+0xe5/0x110 [ 326.474030] __x64_sys_mount+0x62/0x80 [ 326.477981] do_syscall_64+0xbc/0xf0 [ 326.481784] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.487022] RIP: 0033:0x458079 [ 326.490271] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.509229] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.517011] RAX: ffffffffffffffda RBX: 00007f228334cc90 RCX: 0000000000458079 [ 326.524346] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 20:03:38 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 326.531912] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 [ 326.539237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 326.546555] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:38 executing program 2: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:38 executing program 1 (fault-call:1 fault-nth:2): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 326.721610] FAULT_INJECTION: forcing a failure. [ 326.721610] name failslab, interval 1, probability 0, space 0, times 0 [ 326.734135] CPU: 1 PID: 11110 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 326.741124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.750538] Call Trace: [ 326.753206] dump_stack+0x173/0x1d0 [ 326.756914] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 326.762179] should_fail+0xa19/0xb20 [ 326.765970] __should_failslab+0x278/0x2a0 [ 326.770268] should_failslab+0x29/0x70 [ 326.772632] QAT: Invalid ioctl [ 326.774225] kmem_cache_alloc+0xff/0xb60 [ 326.778390] QAT: Invalid ioctl [ 326.781512] ? getname_flags+0x12f/0xb10 [ 326.789056] ? should_fail+0x191/0xb20 [ 326.793017] getname_flags+0x12f/0xb10 [ 326.796970] user_path_at_empty+0xbb/0x140 [ 326.801279] do_mount+0x2c1/0x65e0 [ 326.804882] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 326.810148] ? copy_mount_options+0x4cb/0x670 [ 326.814734] ksys_mount+0x32e/0x3d0 [ 326.818446] __se_sys_mount+0xe5/0x110 [ 326.822436] __x64_sys_mount+0x62/0x80 [ 326.826398] do_syscall_64+0xbc/0xf0 [ 326.830186] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.835430] RIP: 0033:0x458079 [ 326.838691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.857657] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:03:38 executing program 2: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:39 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x3e, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) unlink(&(0x7f0000000000)='./file0\x00') setsockopt$inet6_tcp_int(r1, 0x6, 0x26, &(0x7f00000000c0)=0x1f, 0x4) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) [ 326.865439] RAX: ffffffffffffffda RBX: 00007f228334cc90 RCX: 0000000000458079 [ 326.872760] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 326.880076] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 [ 326.887397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 326.894817] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:39 executing program 2: creat(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 327.024057] QAT: Invalid ioctl [ 327.083217] QAT: Invalid ioctl 20:03:39 executing program 1 (fault-call:1 fault-nth:3): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:39 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 327.290554] FAULT_INJECTION: forcing a failure. [ 327.290554] name failslab, interval 1, probability 0, space 0, times 0 [ 327.302050] CPU: 0 PID: 11123 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 327.309023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.318414] Call Trace: [ 327.321086] dump_stack+0x173/0x1d0 [ 327.324779] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 327.330026] should_fail+0xa19/0xb20 [ 327.333813] __should_failslab+0x278/0x2a0 [ 327.338198] should_failslab+0x29/0x70 [ 327.342158] kmem_cache_alloc+0xff/0xb60 [ 327.346282] ? alloc_vfsmnt+0x73/0xb10 [ 327.350243] alloc_vfsmnt+0x73/0xb10 [ 327.354034] vfs_kern_mount+0xaf/0x8c0 [ 327.357999] do_mount+0x1137/0x65e0 [ 327.361697] ? kmsan_internal_check_memory+0xb41/0xb80 [ 327.367055] ksys_mount+0x32e/0x3d0 [ 327.370758] __se_sys_mount+0xe5/0x110 [ 327.374907] __x64_sys_mount+0x62/0x80 [ 327.378859] do_syscall_64+0xbc/0xf0 [ 327.382675] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.387926] RIP: 0033:0x458079 [ 327.391182] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.410146] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.417915] RAX: ffffffffffffffda RBX: 00007f228334cc90 RCX: 0000000000458079 [ 327.425231] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 327.432550] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 20:03:39 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 327.439871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 327.447194] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:39 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 327.504222] QAT: Invalid ioctl 20:03:39 executing program 1 (fault-call:1 fault-nth:4): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:39 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000000)={0x2, r0, 0x1}) [ 327.717723] FAULT_INJECTION: forcing a failure. [ 327.717723] name failslab, interval 1, probability 0, space 0, times 0 [ 327.729306] CPU: 0 PID: 11135 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 327.736284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.745682] Call Trace: [ 327.748346] dump_stack+0x173/0x1d0 [ 327.752039] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 327.757316] should_fail+0xa19/0xb20 [ 327.761108] __should_failslab+0x278/0x2a0 [ 327.765423] should_failslab+0x29/0x70 [ 327.769405] kmem_cache_alloc+0xff/0xb60 [ 327.773539] ? ecryptfs_mount+0x173/0x3090 [ 327.777856] ecryptfs_mount+0x173/0x3090 [ 327.781999] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 327.782007] QAT: Invalid ioctl [ 327.782278] QAT: Invalid ioctl [ 327.787431] ? pcpu_alloc+0x1f36/0x2480 [ 327.787494] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 327.787549] ? version_show+0xb0/0xb0 [ 327.787601] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 327.806707] QAT: Invalid ioctl [ 327.807038] ? version_show+0xb0/0xb0 [ 327.819238] ? version_show+0xb0/0xb0 [ 327.823091] mount_fs+0x254/0x740 [ 327.826625] vfs_kern_mount+0x231/0x8c0 [ 327.830684] do_mount+0x1137/0x65e0 [ 327.834384] ? kmsan_internal_check_memory+0xb41/0xb80 [ 327.839751] ksys_mount+0x32e/0x3d0 [ 327.843448] __se_sys_mount+0xe5/0x110 [ 327.847402] __x64_sys_mount+0x62/0x80 [ 327.851354] do_syscall_64+0xbc/0xf0 [ 327.855152] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.860388] RIP: 0033:0x458079 [ 327.863637] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.882594] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.890360] RAX: ffffffffffffffda RBX: 00007f228334cc90 RCX: 0000000000458079 [ 327.897667] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 327.904981] RBP: 000000000073bf00 R08: 0000000020000340 R09: 0000000000000000 20:03:40 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 327.912295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 327.919602] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 [ 327.927259] Getting sb failed; rc = [-12] 20:03:40 executing program 1 (fault-call:1 fault-nth:5): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:40 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:40 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 328.156549] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 328.165550] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 328.178065] Error parsing options; rc = [-22] [ 328.188177] QAT: Invalid ioctl 20:03:40 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 20:03:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x8, 0x4}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:40 executing program 0: ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) [ 328.410622] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 328.419723] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 328.432264] Error parsing options; rc = [-22] 20:03:40 executing program 0: prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r1 = socket(0xa, 0x3, 0x1000000000ff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r1, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) 20:03:40 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) [ 328.498951] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 328.507934] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 328.520467] Error parsing options; rc = [-22] 20:03:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = getuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r1, r2) recvfrom(r0, &(0x7f00000000c0)=""/163, 0xa3, 0x60, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x4, 0x1, {0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x26}, 0x4}}}, 0x80) [ 328.663609] QAT: Invalid ioctl [ 328.677997] QAT: Invalid ioctl [ 328.716766] QAT: Invalid ioctl [ 328.720121] QAT: Invalid ioctl [ 328.763578] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 328.772557] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 328.785592] Error parsing options; rc = [-22] 20:03:40 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$pokeuser(0x6, r0, 0x3, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) tkill(r0, 0x20) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) 20:03:40 executing program 2 (fault-call:1 fault-nth:0): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 328.837967] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 328.846908] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 328.859467] Error parsing options; rc = [-22] [ 328.943514] FAULT_INJECTION: forcing a failure. [ 328.943514] name failslab, interval 1, probability 0, space 0, times 0 [ 328.955014] CPU: 0 PID: 11178 Comm: syz-executor.2 Not tainted 5.0.0+ #13 [ 328.961995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.971385] Call Trace: [ 328.974048] dump_stack+0x173/0x1d0 [ 328.977742] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 328.982875] QAT: Invalid ioctl [ 328.982997] should_fail+0xa19/0xb20 [ 328.988256] QAT: Invalid ioctl 20:03:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x3f) [ 328.989974] __should_failslab+0x278/0x2a0 [ 328.990042] should_failslab+0x29/0x70 [ 329.001390] __kmalloc_track_caller+0x1ce/0xc70 [ 329.006132] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 329.011413] ? ksys_mount+0xc4/0x3d0 [ 329.015191] ? strnlen_user+0x36d/0x490 [ 329.019243] strndup_user+0x154/0x300 [ 329.023114] ksys_mount+0xc4/0x3d0 [ 329.026722] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 329.031980] __se_sys_mount+0xe5/0x110 [ 329.035954] __x64_sys_mount+0x62/0x80 [ 329.039915] do_syscall_64+0xbc/0xf0 [ 329.043705] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.048963] RIP: 0033:0x458079 [ 329.052221] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.071178] RSP: 002b:00007fe19553ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.078949] RAX: ffffffffffffffda RBX: 00007fe19553ac90 RCX: 0000000000458079 [ 329.086262] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 329.093602] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.101005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe19553b6d4 [ 329.108336] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:41 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x3f) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 329.149484] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 329.158446] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 329.170960] Error parsing options; rc = [-22] [ 329.181514] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 329.190563] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 329.203040] Error parsing options; rc = [-22] 20:03:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000440)={0x7f, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x6, [{{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x390) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x1000, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:41 executing program 2 (fault-call:1 fault-nth:1): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 329.263980] QAT: Invalid ioctl [ 329.273115] QAT: Invalid ioctl [ 329.284445] QAT: Invalid ioctl [ 329.292662] QAT: Invalid ioctl [ 329.426419] FAULT_INJECTION: forcing a failure. [ 329.426419] name failslab, interval 1, probability 0, space 0, times 0 [ 329.437947] CPU: 0 PID: 11195 Comm: syz-executor.2 Not tainted 5.0.0+ #13 [ 329.444925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.454349] Call Trace: [ 329.457021] dump_stack+0x173/0x1d0 [ 329.460715] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 329.465969] should_fail+0xa19/0xb20 [ 329.469758] __should_failslab+0x278/0x2a0 [ 329.474066] should_failslab+0x29/0x70 [ 329.478022] kmem_cache_alloc+0xff/0xb60 [ 329.482154] ? getname_flags+0x12f/0xb10 [ 329.486277] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 329.491555] getname_flags+0x12f/0xb10 [ 329.495515] user_path_at_empty+0xbb/0x140 [ 329.499825] do_mount+0x2c1/0x65e0 [ 329.503431] ? copy_mount_options+0x4c/0x670 [ 329.507924] ? copy_mount_options+0x513/0x670 [ 329.512505] ksys_mount+0x32e/0x3d0 [ 329.516210] __se_sys_mount+0xe5/0x110 [ 329.520170] __x64_sys_mount+0x62/0x80 [ 329.524114] do_syscall_64+0xbc/0xf0 [ 329.527911] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.533147] RIP: 0033:0x458079 [ 329.536396] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.555357] RSP: 002b:00007fe19553ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.563135] RAX: ffffffffffffffda RBX: 00007fe19553ac90 RCX: 0000000000458079 20:03:41 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) [ 329.570449] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 329.577767] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.585087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe19553b6d4 [ 329.592400] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:03:41 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='binfmt_misc\x00', 0xfffff, &(0x7f0000000600)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xe2\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\xdd\x81\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x16Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl\x19E[6\x00s\xb3\f{1\xd9\xe5+v\n\xa4\xbc\x02_x\xbe\x8fC\x03\xdb\x1c\xc3\x9e\xbfl\x00\rr\xdb\xc4\x1a\xfb\xe4\x00l9\x90%\xaa ,\xfbV\x18\xe0b\x90\x88\"\xfb$\xbc\x14{\x95%_\xb5\xd5S\xec-xo\x12l\xb4\xe2n\xc7?\x13\xed\xcc\xce\xaa\x99\xa2\xde\xd8\xd9\x8d\xb7\xef\xed\xef\xc8z\xac\x1c\x15\xd9\xeb\xa0}\xf3/\xa8d\xb8\x94\x04yp\xdb\xc9{S\xa5\xfe\xc6\xe4\x111\xc3\xb8\xcc\x10\x1a\xee\xb5\x84C\\\xca]\xdd5\x0f\xae\xa7d\xa3@\xfa|\x92\xab\x8b\x97\v\x92\xdb\x81\xcd\x9f\xbb*\x80KiBb\xee\xd4\xb4\xdcm\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 20:03:41 executing program 2 (fault-call:1 fault-nth:2): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 329.827989] FAULT_INJECTION: forcing a failure. [ 329.827989] name failslab, interval 1, probability 0, space 0, times 0 [ 329.839479] CPU: 1 PID: 11205 Comm: syz-executor.2 Not tainted 5.0.0+ #13 [ 329.846462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.855864] Call Trace: [ 329.858547] dump_stack+0x173/0x1d0 [ 329.862242] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 329.867491] should_fail+0xa19/0xb20 [ 329.871287] __should_failslab+0x278/0x2a0 [ 329.875597] should_failslab+0x29/0x70 [ 329.879570] kmem_cache_alloc+0xff/0xb60 [ 329.883711] ? alloc_vfsmnt+0x73/0xb10 [ 329.887694] alloc_vfsmnt+0x73/0xb10 [ 329.891500] vfs_kern_mount+0xaf/0x8c0 [ 329.895473] do_mount+0x1137/0x65e0 [ 329.899168] ? copy_mount_options+0x41/0x670 [ 329.903666] ksys_mount+0x32e/0x3d0 [ 329.907374] __se_sys_mount+0xe5/0x110 [ 329.911346] __x64_sys_mount+0x62/0x80 [ 329.915301] do_syscall_64+0xbc/0xf0 [ 329.919085] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.924318] RIP: 0033:0x458079 [ 329.927566] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.946536] RSP: 002b:00007fe19553ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.954351] RAX: ffffffffffffffda RBX: 00007fe19553ac90 RCX: 0000000000458079 [ 329.961684] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 329.969001] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:03:42 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0x6, @remote, 0x20}}, 0x80000001, 0x6}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r1, 0x6, 0x7}, 0x8) [ 329.976315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe19553b6d4 [ 329.983649] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 [ 330.063479] QAT: Invalid ioctl 20:03:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="afebd96ad49d4a8ff925592f94fd440dbd888ca9e6e81c00b8b599d59cd45be8b71b40e634f23fcfc0", 0x29}], 0x1, 0x0) [ 330.092375] QAT: Invalid ioctl 20:03:42 executing program 2 (fault-call:1 fault-nth:3): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:42 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x53d9, 0x400) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000040)={0xb0, "cec56ac8008452709a1905a92ee6915d14bb4c81a70b41d4b96bf2aac6c22271", 0x2, 0x1}) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x2, 0x1}) r1 = epoll_create1(0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x89) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x4, 0x81, 0x6, 0xfffffffffffffff7, 0x4, r2}) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000001c0)=0x7f) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/226, &(0x7f0000000300)=0xe2) r3 = socket$bt_rfcomm(0x1f, 0x1, 0x3) umount2(&(0x7f0000000340)='./file0\x00', 0x9) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000380)={0xffffffff, 0x1, 0x1}) ioctl$int_out(r3, 0x2, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000400)={0x0, 0x58d2}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r4, 0x808}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)={r4, 0x1000, "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"}, &(0x7f0000001500)=0x1008) socket$isdn_base(0x22, 0x3, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001540)='/dev/cuse\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000001580)) r7 = geteuid() sendmsg$nl_generic(r0, &(0x7f0000001740)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x4004000}, 0xc, &(0x7f0000001700)={&(0x7f0000001600)={0xc4, 0x3c, 0x824, 0x70bd2d, 0x25dfdbfc, {0x1b}, [@typed={0x8, 0x26, @uid=r7}, @typed={0x1c, 0x34, @str='keyringvboxnet0wlan1\x00'}, @nested={0x8c, 0x11, [@generic="6d9231c32e01e5a8fa7c30a1f53fa4944b5cb9f7d8727027ca96c667961ed239b5761411164a48ee9122dc23b921aa28d994c1101f732a27b61d6357322c1c329eb6480f08c7833225906261662085f7b0bbf0375c8b86505fc2455f544e8c32967b424f80eca620eaa0cd9a91c0336faa", @typed={0x14, 0x51, @ipv6=@dev={0xfe, 0x80, [], 0x29}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x11}, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000001780)) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000017c0)=""/109) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000001840)=""/143) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001900)={r5, 0x87, "ac3c6d5e2318b6d25510d2a79bed2aa1d2d4fae5f7860d2625eb7ad0c95cee62c3db457601731fae1f0ad775219ae23a993d6979d016ca7cc1ffad69701329f19af63d1f1f08b2e864e0c631fdcd2027fa1a17994d8a60aa9dd5d7781685c4c62751d172673addb1ea0fddb379458c8c6c3862f5fbc94446f9133022b443c7987b3be915373274"}, &(0x7f00000019c0)=0x8f) ioctl$VT_RELDISP(r6, 0x5605) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x22014040}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001a80)={0x104, r8, 0x1, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4753}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x4}]}, 0x104}, 0x1, 0x0, 0x0, 0x54}, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000001c40)={0xffffffffffffffff, "2c383d42e656c32cd3c3a8cb12b58b638e64c96c00955a83c96438d3c25a0d25", 0x400, 0x5, 0x1f, 0x12, 0x7}) mknod$loop(&(0x7f0000001cc0)='./file0\x00', 0x0, 0x0) [ 330.197690] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 330.206730] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 330.219248] Error parsing options; rc = [-22] 20:03:42 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x49c77220, 0x28000) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x420200, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0x3, 0x0, 0x4, {0x7e, 0x5, 0x0, 0xfe}}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x10000, @empty, 0x2}}, 0x421, 0x5}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000300)={r2, 0x9}, &(0x7f0000000340)=0x8) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) [ 330.289929] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 330.298890] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 330.311554] Error parsing options; rc = [-22] [ 330.412213] QAT: Invalid ioctl [ 330.429484] QAT: Invalid ioctl 20:03:42 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) ioctl$TCSBRK(r0, 0x5409, 0xffffffff) r1 = creat(&(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x1ff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000480)={r2, @in6={{0xa, 0x4e24, 0x8, @mcast2, 0x3}}}, &(0x7f0000000540)=0x84) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xf8, r3, 0x300, 0x18000000000, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xab5f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1954}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfe}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x50, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0xc0}, 0x80) 20:03:42 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x100, 0x30}, &(0x7f0000000100)=0xc) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x80800, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, 0x0) openat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) [ 330.563685] FAULT_INJECTION: forcing a failure. [ 330.563685] name failslab, interval 1, probability 0, space 0, times 0 [ 330.575222] CPU: 0 PID: 11221 Comm: syz-executor.2 Not tainted 5.0.0+ #13 [ 330.582197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.591595] Call Trace: [ 330.594261] dump_stack+0x173/0x1d0 [ 330.597957] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 330.603212] should_fail+0xa19/0xb20 [ 330.607000] __should_failslab+0x278/0x2a0 [ 330.611303] should_failslab+0x29/0x70 [ 330.615260] kmem_cache_alloc+0xff/0xb60 [ 330.619390] ? ecryptfs_mount+0x173/0x3090 [ 330.623719] ecryptfs_mount+0x173/0x3090 [ 330.627851] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 330.633283] ? pcpu_alloc+0x1f36/0x2480 [ 330.637354] ? version_show+0xb0/0xb0 [ 330.641232] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 330.646489] ? version_show+0xb0/0xb0 [ 330.650365] ? version_show+0xb0/0xb0 [ 330.654230] mount_fs+0x254/0x740 [ 330.657766] vfs_kern_mount+0x231/0x8c0 [ 330.661826] do_mount+0x1137/0x65e0 [ 330.665535] ? copy_mount_options+0x41/0x670 [ 330.670025] ksys_mount+0x32e/0x3d0 [ 330.673733] __se_sys_mount+0xe5/0x110 [ 330.679241] __x64_sys_mount+0x62/0x80 [ 330.683197] do_syscall_64+0xbc/0xf0 [ 330.686995] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.692225] RIP: 0033:0x458079 [ 330.694306] QAT: Invalid ioctl [ 330.695471] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.695496] RSP: 002b:00007fe19553ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.695537] RAX: ffffffffffffffda RBX: 00007fe19553ac90 RCX: 0000000000458079 [ 330.695571] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 330.703092] QAT: Invalid ioctl [ 330.717709] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 330.717733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe19553b6d4 [ 330.717758] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 [ 330.720142] Getting sb failed; rc = [-12] 20:03:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x0, &(0x7f00000001c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 20:03:43 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$setstatus(r0, 0x4, 0x400) setfsgid(r1) 20:03:43 executing program 2 (fault-call:1 fault-nth:4): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 330.996474] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 331.005490] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 331.018171] Error parsing options; rc = [-22] [ 331.060432] QAT: Invalid ioctl [ 331.093051] QAT: Invalid ioctl 20:03:43 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 331.120142] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 331.129308] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 331.141946] Error parsing options; rc = [-22] [ 331.240513] IPVS: ftp: loaded support on port[0] = 21 [ 331.273508] QAT: Invalid ioctl 20:03:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getcwd(&(0x7f00000000c0)=""/124, 0x7c) 20:03:43 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x400000) sendto$inet(r0, &(0x7f0000000280)="64f738cab1567962b3283b73e3acb950b4377802792e5a5087757926bd13a7a3a46f6beb9425076051c55aaae1c0021a6d7717605387cc93c5c8bd8241430751a7f1a8f735e529e9b3c2cacda91cba7bf35c5ee9bc71caf39a69b959b5e79c07f663d819b1e0627ecb88b72a34bffb8fa4639342d3c51f5c1ad85e29402c5c65dd8b0be5f5eef0980a384a9a215807e83872b0f0ed0ad46315dc3264f22de9c8bef0686e", 0xa4, 0x4000000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = getuid() lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r2, r3) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000380)={0x0, 0x3, 0xdb1c, &(0x7f0000000340)=0x3}) renameat2(r1, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x6) 20:03:43 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) [ 331.432146] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 331.440975] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 331.454703] Error parsing options; rc = [-22] [ 331.473499] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 331.482457] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 331.494944] Error parsing options; rc = [-22] [ 331.570552] Error parsing options; rc = [-22] [ 331.580811] QAT: Invalid ioctl [ 331.590227] Error parsing options; rc = [-22] [ 331.605810] QAT: Invalid ioctl 20:03:43 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 331.651975] chnl_net:caif_netlink_parms(): no params data found [ 331.833877] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.834740] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 331.840412] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.849413] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 331.857949] device bridge_slave_0 entered promiscuous mode [ 331.868300] Error parsing options; rc = [-22] [ 331.931451] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.938328] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.946886] device bridge_slave_1 entered promiscuous mode [ 331.986157] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 332.000351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 332.035992] team0: Port device team_slave_0 added [ 332.045996] team0: Port device team_slave_1 added [ 332.127020] device hsr_slave_0 entered promiscuous mode [ 332.163028] device hsr_slave_1 entered promiscuous mode [ 332.406757] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.413450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.420661] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.427393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.514907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.537037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.548253] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.556761] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.569390] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 332.591960] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.610442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.619666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.631605] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.638147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.695690] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.705704] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 332.721873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.730390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.738752] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.745306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.754592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.763905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.773087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.782033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.790868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.799911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.808846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.817230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.825961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.834237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.845410] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.854066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.908363] 8021q: adding VLAN 0 to HW filter on device batadv0 20:03:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0xfffffffffffffe4c) 20:03:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x480800) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@local, @remote, @empty, 0x1f, 0xfffffffffffffff9, 0x10001, 0x400, 0xf571, 0x1, r1}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r2, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/21, 0x15, 0xffffffffffffffff}}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0x55) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r2, 0x10, &(0x7f0000000100)={&(0x7f0000000000), 0x0, r3}}, 0x10) 20:03:45 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(r0, r1, 0x80000) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') accept4(r0, 0x0, &(0x7f0000000040), 0x80000) [ 333.119037] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 333.128043] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 333.141346] Error parsing options; rc = [-22] [ 333.148920] Error parsing options; rc = [-22] [ 333.178075] Error parsing options; rc = [-22] [ 333.188250] QAT: Invalid ioctl [ 333.212268] QAT: Invalid ioctl 20:03:45 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$KDGKBLED(r0, 0xc004510e, &(0x7f00000000c0)) dup3(r0, r0, 0x80000) [ 333.258756] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 333.267809] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 333.280353] Error parsing options; rc = [-22] 20:03:45 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x20) connect(r0, &(0x7f0000000100)=@caif, 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000000c0)={0x0, {0x9, 0x87}}) 20:03:45 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0x6, 0x2, 0xf, 0x7, 0xae, 0x8e, 0xffff, 0x20, 0x4, 0x0, 0x6e31, 0x1ff}, {0x0, 0xf000, 0xb, 0xd6, 0xd02, 0x5a, 0x1, 0x7, 0x3, 0x3ee, 0x100000000, 0x7f}, {0x2, 0x104000, 0xa, 0x9, 0x1, 0x9, 0x3, 0xa4, 0xd9b, 0x7, 0xc8a, 0x3ff}, {0x1, 0x1d000, 0xe, 0x8, 0x20, 0x30000000000000, 0x8, 0x3, 0x80000001, 0x80000000, 0x9, 0x1f}, {0x0, 0x1f001, 0x10, 0x4, 0x82, 0x9, 0x100000000, 0x401, 0x0, 0x4, 0x0, 0x5}, {0xf000, 0x1, 0xb, 0xe4, 0x2, 0x4, 0x8001, 0xac, 0x6, 0x5, 0x9bd, 0x3}, {0x6003, 0x5004, 0xb, 0x55db939, 0x4, 0xff5, 0x7fff, 0x40000000, 0x6, 0x40, 0x2, 0x5}, {0x4, 0x3000, 0x0, 0xf6d, 0x5, 0xff, 0x174, 0xfc900, 0x8, 0xb95, 0x8, 0x8d}, {0x2, 0x3000}, {0x1000, 0x112000}, 0x32, 0x0, 0x5000, 0x40042, 0x6, 0x0, 0x7000, [0x7ff, 0x7, 0x64ff, 0x8]}) [ 333.475966] Error parsing options; rc = [-22] 20:03:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x200, 0x600) chmod(&(0x7f0000000100)='.\x00', 0xc05897a0db1ef5f3) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r2, 0x7ff}}, 0x18) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x801, 0x0) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x40000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') pread64(r0, &(0x7f0000000200)=""/169, 0xa9, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') [ 333.509003] Error parsing options; rc = [-22] [ 333.520122] QAT: Invalid ioctl [ 333.542288] QAT: Invalid ioctl [ 333.558052] QAT: Invalid ioctl [ 333.561879] QAT: Invalid ioctl 20:03:45 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$KDGKBLED(r0, 0xc004510e, &(0x7f00000000c0)) dup3(r0, r0, 0x80000) 20:03:45 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x22) recvmsg(r0, &(0x7f0000000380)={&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/194, 0xc2}, {&(0x7f0000000240)=""/241, 0xf1}], 0x2}, 0x102) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 333.638911] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 333.647998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 333.661551] Error parsing options; rc = [-22] 20:03:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x20140, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f00000000c0)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x4, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, 0x0) [ 333.786438] Error parsing options; rc = [-22] [ 333.820841] QAT: Invalid ioctl [ 333.832475] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 333.841553] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 333.854636] Error parsing options; rc = [-22] 20:03:45 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x205367ef43e820e7) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast1}], 0x1) 20:03:46 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1, 0x81, 0x8}, 0xc) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1000010017020007002e2f66696c6530"], 0x10) 20:03:46 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000040)={0x9f0000, 0xb415, 0x2, [], &(0x7f0000000000)={0x9a0915, 0x80000000, [], @value64}}) pipe2(&(0x7f0000000140), 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000080)=""/159) [ 334.135565] QAT: Invalid ioctl 20:03:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000058f000)="440d05a103001d000000000020", 0xd) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x800) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x3, "88cee7"}, &(0x7f0000000080)=0xb) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000100)=0x10001, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x1}, 0x8) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) [ 334.173830] QAT: Invalid ioctl [ 334.177639] Error parsing options; rc = [-22] [ 334.204394] QAT: Invalid ioctl [ 334.237965] QAT: Invalid ioctl [ 334.241388] QAT: Invalid ioctl [ 334.256823] QAT: Invalid ioctl 20:03:46 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000100)=0xc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) epoll_create(0x6) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$P9_RREAD(r0, &(0x7f00000003c0)={0x36, 0x75, 0x2, {0x2b, "b4d22bc461be4f845c1fdac620439e433bccc9020d0d8f55dcd97f4f209ff2ddc42d455a72287da7838516"}}, 0x36) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000380)={{0x8, 0x81, 0x2, 0xf927, 0xfffffffffffff001, 0x4}, 0x8000, 0x3, 0x13096bea}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x20000, 0x4) rmdir(&(0x7f0000000140)='./file0\x00') syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000001c0)={{0x7, 0xffff, 0x101, 0x6, 0x7b91efd9, 0x71c96d59}, 0x5, 0x5, 0x200}) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=""/144, 0x90) 20:03:46 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0x807f, 0x3}) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x4b6, &(0x7f00000000c0)=0x1}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000080)={0x106000, 0x4000}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) [ 334.418836] Error parsing options; rc = [-22] 20:03:46 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @multicast2}}}, 0x84) creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)={0x8, 0x4, 0x7, 0x401, 0x7, [{0xae69, 0xc16a, 0x8db, 0x0, 0x0, 0x100c}, {0x2, 0x10000, 0x80, 0x0, 0x0, 0x1001}, {0x0, 0x6, 0x7}, {0xa9, 0x81, 0x2, 0x0, 0x0, 0x4}, {0x866, 0x401, 0x8, 0x0, 0x0, 0xa00}, {0x7, 0x3, 0x5, 0x0, 0x0, 0x2800}, {0x9, 0x3, 0x1, 0x0, 0x0, 0x400}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 334.480304] Error parsing options; rc = [-22] [ 334.495770] QAT: Invalid ioctl [ 334.521014] QAT: Invalid ioctl [ 334.534941] QAT: Invalid ioctl [ 334.548962] QAT: Invalid ioctl [ 334.564770] QAT: Invalid ioctl [ 334.582197] QAT: Invalid ioctl [ 334.602217] QAT: Invalid ioctl [ 334.606835] QAT: Invalid ioctl [ 334.618959] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 20:03:46 executing program 2: rmdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 334.628154] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 334.640704] Error parsing options; rc = [-22] 20:03:46 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 334.735613] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 334.744674] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 334.757197] Error parsing options; rc = [-22] [ 334.784649] Error parsing options; rc = [-22] [ 334.802164] Error parsing options; rc = [-22] 20:03:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000000c0)="7b9f4519c46f69718763ce18f25b8965f3355c8858251962022e0be8efa60520061515f661319b2383fed7f475c4efdc556e28d8fe909da82e56009c72e00c324d2ffdeaa08571e347e48ffdf7bd9611149d368e0f8a1cfd874dcb6d468795043b51f44b8f61cf0374b4e2c83c55d303a34f93a5a59f8e886880757824ab01c975ffec0da74117cf1ce019ff0f886554c642092b5977049726f4c67c0adb100fad61bb7f25f5a521c80dbdb219204e2cac956f9aeb65c23cea56ec710d1a80e3c3e271faad6c4ba3f4ba588dbf1b1d8e390485a5eb344b50012715091aed1e491d9e35210f32da7b", 0xe8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)="fbb22a08bef0ddaf0dfc558c3620768a5c9a1b35f1175c8bbafa92527e127abf5397831bae01489aa9f1fe80426acd517f8fcd73de1a6359e5c2e23e2d67d99902507cf3493f3c9afd3e5a34b2947bd8003b0b7eb804c0ba2a41404a013709734ee120e1d23e0659bc48040e067ed82b8715c2a63d7a4c567ed4af4843a247a1825ad4dd346fcb90435c19635cc23dff930ae5597a8ef82bb812204bbaca9a8d46168db23d03b03f09049d9d34a6dc55e4703be6d5c8bbe4e85c59513edd2662f69145df2b72110512048be446a3a48a3854afd268b98c77279599babdd38e532dc0c685e257573a44") [ 334.844713] QAT: Invalid ioctl 20:03:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x4) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:47 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) fcntl$dupfd(r1, 0x0, r0) [ 335.027183] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 335.036258] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 335.049770] Error parsing options; rc = [-22] [ 335.073702] Error parsing options; rc = [-22] [ 335.078913] QAT: Invalid ioctl [ 335.089796] QAT: Invalid ioctl [ 335.094013] Error parsing options; rc = [-22] 20:03:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xffffffff, 0x9, 0x4, 0x3, 0x3, 0x3, 0x80000000, 0xea, 0x40, 0x2d3, 0x1ff, 0x80, 0x38, 0x2, 0x4, 0xff, 0xf50}, [{0x0, 0x80000000000000, 0x5, 0x1, 0x3149, 0x8000, 0x0, 0x747}], "49aa7a11e0e9816194c162da2567e5c8cd6fda8cbe0a808b3092d29dd79f5cf4e5bbc6ffe0a420c5ca6d107eede0b6dc6e716351e633064d2a884da07104d445212bb600e80c56167f05b1e94cf7cc3c6706cfbc2661e4552cb951d6c295ae93d8305894bbf6f35b4e34d5"}, 0xe3) write$cgroup_pid(r0, &(0x7f0000000000)=r1, 0x12) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 335.161226] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 335.170247] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 335.182880] Error parsing options; rc = [-22] 20:03:47 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(r1) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={r1, r2, r3}, 0xc) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x109000, 0x0) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000100)) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000110007041dfffd946f610500090800000700000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) openat$cgroup(r4, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) [ 335.267341] QAT: Invalid ioctl [ 335.303250] QAT: Invalid ioctl 20:03:47 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x63, "7a7a681fbb7a3b86b0c947c793749b1042e016475483f8a54b0fbc1e94cda02846d684df919afb071ff7474785384633e5bb58f30738c0a3cc4bedded51f7f9944677ae8e9a7a639515d653afc253cf32859257b1585c0e6da9adfce6196bf880c565f"}, &(0x7f0000000040)=0x6b) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={r1, @in={{0x2, 0x4e21, @remote}}, 0x5, 0x7}, &(0x7f0000000340)=0x90) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000004c0)={0x0, @src_change}) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000380)={'mangle\x00', 0xd0, "b31d85e14bb8c0ffd1aad5e6ad54bb7f21dfc487d8214b97d9e12b6fbee682b96eb4fadbe35b3f88e5d3740628e1d0f98591510e15ec3e06ec8f2983f8f5bd0ad2bf6837fbd5ff4d13e328027f0c9be82e126150791c1ac48b06726fe06fe8039e6776dbffd7bfa4994e4daad4bd40f6499e75bfec0076641d55958d822bc59737087375680a0fe051e56a74580baab892fafba74b33a2718ffd83e205e42a3e1cd288fb65b28bc941a09c3cca2d4188d6de227c1d997f3f02e94afdcf891658e5fe4a24028c73a53b39019f57932105"}, &(0x7f0000000480)=0xf4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x92, @ipv4={[], [], @multicast1}, 0x20}}, 0x6, 0x3}, &(0x7f0000000240)=0x90) 20:03:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x9477673167debc31) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r2 = geteuid() getgroups(0x7, &(0x7f0000000140)=[0x0, 0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff]) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='fuseblk\x00', 0x20000, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',groupKid=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,allow_other,blksize=0x0000000000000800,allow_other,euid=', @ANYRESDEC=r4, @ANYBLOB="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"]) lseek(r0, 0x0, 0x4) 20:03:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x12, 0xfffffffffffffff9, 0x2a}, {{0x0, 0x2710}, 0x12, 0x5, 0x40}, {{r1, r2/1000+30000}, 0x15, 0x2, 0x8000}, {{r3, r4/1000+10000}, 0x0, 0x761c}, {{0x77359400}, 0x0, 0x5, 0x9}, {{0x77359400}, 0x2, 0x8, 0x2}, {{0x77359400}, 0x1, 0x20, 0x8}, {{0x0, 0x2710}, 0x4, 0x6, 0x7}], 0xc0) [ 335.466581] Error parsing options; rc = [-22] [ 335.502602] Error parsing options; rc = [-22] 20:03:47 executing program 3: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x147) [ 335.578174] QAT: Invalid ioctl [ 335.596607] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 335.605780] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 335.618291] Error parsing options; rc = [-22] 20:03:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000180)="b5f5e3c34f78ab29f5f2e681f98a863a171399eabbf9bcd8c9aba317a97e925fd682") [ 335.652751] QAT: Invalid ioctl [ 335.737800] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) [ 335.749208] Error parsing options; rc = [-22] [ 335.774246] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 20:03:47 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000000)=0xdd) [ 335.783277] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 335.795811] Error parsing options; rc = [-22] [ 335.802177] Error parsing options; rc = [-22] 20:03:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENT(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="52326e6879056afba870000000000000000600000000000000050000000028000000000000007573657400000400000000000000010000000180d89afcdb60f07dd95c939b00000007000000bd7b0000cd73797374656d0005000000000000000800870607fa00000500000000800000534547360000000000000000"], 0x70) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000008c0)={0x7, 0x9, 0x10000, 0x8, 0xd, 0x4, 0x1, 0x800, 0x80000000, 0xffff}) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000680)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000740)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0xffffffffffffff59, r4, 0x20, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x88}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRET={0x4}]}, 0x19}, 0x1, 0x0, 0x0, 0x80c0}, 0x4080) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000580)={0x1}) r6 = getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) sendmsg$unix(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000040)="ece0016dc333a136026c7d6194a23328b6c3c694b9930e3b4e5be6072f33da494a2ac6dc1752dd31b122285f0eb9aae036944590e2", 0x35}, {&(0x7f0000000140)="66c3aa7ee758639966311f2551b72845e9fe7d9b5affa9880a51ef1fdaaffc4ef87aa74d6658f9d6004e5bb39c737b52c41f027c4dbeceb02a62745f57d222e11a275c31b6504585874a09aa59f596f8f41694ff41d744", 0x57}], 0x2, &(0x7f00000009c0)=ANY=[@ANYBLOB="2000000000bf6e5347af4028fd00000000e1070000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x70, 0x8000}, 0x40000) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) syz_open_dev$rtc(&(0x7f0000000900)='/dev/rtc#\x00', 0x4466, 0x10080) rt_sigqueueinfo(r1, 0xf, &(0x7f0000000440)={0xd, 0x5, 0x5}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000840)={0x11, "7dd66d05fb19730d2d4657cfda38260c7e9c96cf4b4cc10160fd068c940afd84", 0x3, 0x0, 0x1, 0x20, 0x8}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 335.905342] QAT: Invalid ioctl [ 335.913556] QAT: Invalid ioctl [ 335.939997] QAT: Invalid ioctl 20:03:48 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@local, @multicast2, @dev}, &(0x7f00000000c0)=0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0xfffffffffffffd60) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0xff, @rand_addr=0x1, 0x4e20, 0x4, 'rr\x00', 0x29, 0x5, 0x34}, 0x2c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) 20:03:48 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000080)={0x2, 0xffffffffffffffff}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x800, 0x0) 20:03:48 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000000)=""/247, &(0x7f0000000100)=0xf7) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000200)=0x2) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000140)={0x3, 0x0, [{0xc000000b, 0x6, 0x1, 0x8000, 0x4c, 0x513, 0x7f}, {0x80000005, 0x40, 0x2, 0x200, 0x8, 0x7fff, 0x3}, {0xc0000001, 0x6, 0x1, 0x0, 0x5, 0x7fffffff, 0x3}]}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000001c0)={0x7, 0x34, 0x0, 0x2, 0x9}) [ 336.148279] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 336.157302] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 336.169863] Error parsing options; rc = [-22] [ 336.184070] Error parsing options; rc = [-22] [ 336.184512] IPVS: set_ctl: invalid protocol: 255 0.0.0.1:20000 [ 336.216366] Error parsing options; rc = [-22] [ 336.239191] IPVS: set_ctl: invalid protocol: 255 0.0.0.1:20000 [ 336.301942] QAT: Invalid ioctl [ 336.306836] QAT: Invalid ioctl [ 336.324622] QAT: Invalid ioctl 20:03:48 executing program 3: io_setup(0x401, &(0x7f0000000000)=0x0) r1 = timerfd_create(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000d40)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x42a, 0x80000001, 0xffffffffffff0000, 0x1}, {0x3, 0x2, 0x9, 0x7}, {0x80000001, 0x6, 0x7f, 0x6}, {0x100000000, 0x9, 0x101, 0xfffffffffffffff7}, {0x8, 0x5, 0x7, 0xfd}]}) 20:03:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') poll(&(0x7f0000000040)=[{r0}, {r0, 0x8168}, {r0, 0x200}, {r0}, {r0, 0x1}, {r0, 0x8}, {r0}], 0x7, 0x3) [ 336.359425] QAT: Invalid ioctl [ 336.368614] QAT: Invalid ioctl [ 336.380158] QAT: Invalid ioctl 20:03:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='nfs4\x00', 0x200000, &(0x7f0000000180)='cpuset\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x20804, 0x0) 20:03:48 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x1, 0x4) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x100000001, 0x7, 0x2, 0x6}) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 336.580307] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 336.589383] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 336.601933] Error parsing options; rc = [-22] 20:03:48 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x410202) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000001100)={0x0, 0xd7ef}) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000000c0)={0x2, 0x81, 0x81, 0x3, 0x2, 0x8}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ext2\x00', 0x0, 0x0) [ 336.702434] QAT: Invalid ioctl [ 336.707939] QAT: Invalid ioctl [ 336.717851] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 336.719474] QAT: Invalid ioctl [ 336.726781] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 336.726812] Error parsing options; rc = [-22] 20:03:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000000c0)=0x5e7, 0x2b0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.redirect\x00') setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x80000001, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000040)=0x28f) 20:03:49 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r1}}, 0xc) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 20:03:49 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40000000000000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 20:03:49 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000000)=0x3) [ 337.042832] QAT: Invalid ioctl [ 337.063366] QAT: Invalid ioctl [ 337.085307] QAT: Invalid ioctl [ 337.104028] QAT: Invalid ioctl 20:03:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000080)={0x7}) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r2, 0x500, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x57bb1f0b}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x20a000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f00000003c0)={{0x2, 0x1}, 'port0\x00', 0xc, 0x10, 0x0, 0x10000, 0xfff, 0x7, 0x2, 0x0, 0x1, 0x77}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0xa, 0x3, 0x10) faccessat(r1, &(0x7f00000002c0)='./file0\x00', 0x4, 0x1b00) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000001000)="e5f7", 0x2}], 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r4, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x1, 0x29, 0x6}, 0xffffffffffffffb1) 20:03:49 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x40000004, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 337.144736] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 337.153663] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 337.166166] Error parsing options; rc = [-22] 20:03:49 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4400, 0x0) r1 = openat(r0, &(0x7f00000000c0)='./file1\x00', 0x80, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r2 = getuid() setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x101, 0x401}, {0x8000, 0x4}], r2}, 0x18, 0x3) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000100)) [ 337.307666] QAT: Invalid ioctl [ 337.364847] Error parsing options; rc = [-22] 20:03:49 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x2000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@l2={0x1f, 0x4, {0x3, 0x1, 0x7, 0x5, 0x40, 0x4}, 0x700000000000, 0x2}, {&(0x7f00000000c0)=""/224, 0xe0}, &(0x7f0000000040), 0x8}, 0xa0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') removexattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@random={'user.', '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}) bind(r0, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'erspan0\x00'}}, 0x80) [ 337.385509] Error parsing options; rc = [-22] 20:03:49 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0xfffffffffffffeff) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8400, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000180)={0x3, "627582a45c95da378fb540cb52f23a1c84bf92f0bc8c49b75446713422d1a42b", 0x1, 0x20c, 0xfffffffffffffffa, 0x6e, 0x1, 0x6, 0x6, 0x4}) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x18, r1, 0x629, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x2}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) [ 337.465715] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 337.474785] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 337.487287] Error parsing options; rc = [-22] 20:03:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) getitimer(0x2, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getitimer(0x3, &(0x7f0000000040)) [ 337.576973] QAT: Invalid ioctl [ 337.604057] QAT: Invalid ioctl [ 337.620771] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 337.630412] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 337.643379] Error parsing options; rc = [-22] [ 337.650070] QAT: Invalid ioctl [ 337.654599] QAT: Invalid ioctl [ 337.677926] Error parsing options; rc = [-22] [ 337.730346] Error parsing options; rc = [-22] 20:03:49 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000300)={{0x3, 0x0, 0x3, 0x8, 0x5, 0x8000}, 0x5, 0x2, 0x2, 0x3, 0x2, "e0aa1b869770ec87f71e3914aa08626a9446afa2e798fb46226faebaa98a6494fc73b421469dae6b42ff1ceca3bc5e3216adab3a6c49a9a7830813cc35143c2a12617fc0d602791b107c8b6ab7a5e9faf93b793ae105c807f6adcf07b54e9f2f13f106a411369b25428fd6d14882eea2d5dc3fb6ab4d64dd08f99f8b69e44583"}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40000021) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0xb6b, 0x8, 0x6, 0x9, r2}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x005\xcd[\x8e\'R\x063\x91m\x91\x10i$!~st\xb1\x17\x9bI\x8e\xb2\xbd\xd6X\x99w\xab\xe5`\n\"[\x1f\x8d{\x9e3po`\xd9tO\xb25\x8b\xf0\x05\xfa\x90\x99\xd6\xbd', 0x0, &(0x7f0000000140)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:49 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000004200)) accept$packet(r0, &(0x7f0000005e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000a300)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000004240)=0x421) sendmmsg(r0, &(0x7f000000b940)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0x3, 0x2, 0x4, 0x2}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000100)="eeb66746204fd5ee7e09b749e54a20b4a96718d273272a1f068588310f4c403a978cec7edcc63dd2e74bd482901a31fa2ce85babe404feef94eb9dadef9944a34509f9afc9c1ff673055ccc4030cd774b4dc8727044675e36a4b46df7c5514a43399575e04a82d79e711c384069bf760652e6180ede9e802ee1e8bfbbda625fbcc27acf984e22bb88f020e28e9f20166a01426d489e109036c1f07d7829c08ce82c90ecf52d4f4ac59d4cbcd56732cd0d3509729f5e855ed485e8a90727a62bc856056e3aced9accc5b5cbbebeacaf4c4af155d284edd4697195acc26ee08dbf7b74ff5f59dd33627b600be1", 0xec}, {&(0x7f0000000200)="8976176024fa6a001be4750f19932b76f04307037f5c354b8681da8f47d16f8abc7aec7f72f72c17212c88f5e73c33423900680e439e43463a067958ddc5a430d407b85edc27f2515496553c6046dfbbe12f9269cd6ebc739974694746720c71d60813b1f0e73b692689117a40f6efc06fc346a4bb404a78caa8c911481f1205c92018334edecb520613377629984483e0ce34f49dfcd993694936d7cd7d3f60861f94cc8855304d3bb916d1f100f191cff5395c9a06200bfb573baa3d315fad8446e610d0889bae", 0xc8}, {&(0x7f0000000300)="6c4b6bbf5fe479ed4c7a888e51dc7b32a2e96680a5a9f28f82787976d6b879772be0536fdae2e5b5b07cc4c04a73bb7a6bca2062d6af6a8563b60d7eda13cd7019006785defdf51ce35155abaf4e4dec04e782bb17b8fad70d32b27c329792c06613746e9ab4b7969b1778ccbb3994e52f98a428665d32457520ef2a86e443beff1a4744960a99864310e0f9bffec4c07b055d9c7eb043ed", 0x98}, {&(0x7f00000003c0)="ada763c4d85cc4fa92f9608c6f59d240bd29e72f415a5f8a17a46ad6db1917e36b6a7f4f31fb2194604c9d550c970f151b9e3a51e8b90743ca3eafc82adfd9a2fac82854e7e3c766c2e3a58f1843954954987e9085dbd4fdd86546ac7c6060e17c0476469e1a26934504e01e9e451579b5149512f71c73e7631fc413da6d3a6471913ffb072e608f8c7c72d09e89075ba42e65bb889f14d354d67af60c893a5ecec4b792c251ed66283059787954b68a012a33e8983e70749355b24e8c46d83aaa98f8add77c7662e5789d1951bbba1f4c49f84d5e7f25bf23bbe4a50c681f054c362dcf40a89d7832e8e1d131a4cffe238c01444fa0de5110ce0d22faaa3d7ae015a474d3d90f30d38dc2b8466d14848f33293d531f2e33844f734c0ce151ff58de566f25299793cc50a4d2e51fb75b2aa570f8a80ec0c5c5345355b3e8bf01676f358f8d4900e6ffab6d4132f74d9515933c919b2d56d3d898ebb941082bd0b37b218f0bc6d2c4be48298d5138a1ab5946ad3f58e63a39990f24f951ec23e1ccbc28cd8820b4b76a43eef808786913f7dadb75d2d5ac9ff0129b069d26de38a8e0e77c8c79a0056424cbb453a6905b6ac91bf23c00834d14ad77408849dd5139025ecc55e4a92fd378cf9f9a07ce678c86142b4fc0e3f6078e6a2c9bca3530f504c26f793ed2959905a09a56892de04fbff1a73a0bc8004fe1526635e8b14dd8375a725e4f07632f0dc32a054c00e92a2e629078ba5cca488c879ac6791f90b627c6eaa467949cce380609e823591dba91723c9fbdcdc0f92982e948060ee1e10ee92ff8c255045ccfcdda99c3c9b9c16533f50b93a69c65b0ee5bf9813bfb3d795815ee6027e9cd38245b121348e8fa9aab62ea6a50e968281f04a6691b0c15d895de3a797b9a853664319160013e7f060d108690647ff6190c18d8e11a64db1f2ec2599a3c6f8396a2b34a327033d026706d586176796babd14815b3870c5fe00fb90d6393c851f4cb15859ec29365ce1455e8c8cb0c4f988caa0cd46b3ff8cb811c5aaf506f73795f08b5a225d95f5bc04b0f8d11276b14fcad2491e7fca40752b3f92771f130a85accbbeb73b3780c1ff2b0cec39bb9e15b5070de86ab8123db3a0cef1d4242e6a5d85680996bd9ae752469ca26b758b3de13720729a653e760b3e43c3600a9dafbb48d1704326ee35338cfd71365d369f1c884d73ea9ce65da06cf1ac47a29276935c80d05cb2e66b6ab351c94ac384085313c6412a0c6510ad08c81fd1d3a0dfa04245ec445b186d13decfa3f40ced98b1719506268aeb4969b598776642a645b3e0f257630f817b1caefb06e14076e4fe3bb750323aef2b67b332a2535c194382281b65fe1530c2067a0479c2cd776ee1d01a97f8e4f8d9b9d769d8036503d91942276e8631ad34154f1064f41820e80fc2f93daceb946d84dc4b093764b37c94f54b4ec52c5c0f98fb47c74859fa8e8e315983dacb6d6d974d65afe97148980f6583f451231964e2bfaf0e625d0ad1241a28bb08f709c1eee633c5fc0bdf84d359c9fe87866458f9abead3c85e1fc41319d3f65dd69c855b187d73a43739794f61485c069d831f653c12ce50d07b1c22fafe79ebcf2f5505b12c9b862e53f4a6d549681cd32398da98e5a42f747bdf6420a3340a5549bb5c90042ff9b109cb325dbe20923cee1a9a22f0023dc1419bf54c04a20b4a9502d9f2b17993b4d2cc962f7045efebe5a55a0e684148e5de099df8b9cc374bae9ea5be11ce122623ca77f7e03e8fe955d9d222dda1c77505c5569753ddbc38348969bef2d75d2d724c1ca2ea0c7abf42ab431ae3b29fe211c7fde03dcc14b32d57a06f24845c67a6bbd6e81d82ca27bca2bc13da2664e2fa0338dcbc37e3ddeb3b2a8db4b5f599e2fb6c8e3c8650fea31e72e7c7563cbd5baa671c6849b8d80b8f888c2309e6d2e3cc8fd1d10f3ddea88bb06804b72f424cee805d59a30428cb36b0242df6e28f3ad8918af4853786b6819ba2539801016c452bc757d3dd5b592ec72e6c45aebd14372845a0f65ae89a8d385a014a7d305026438fd1a8cd889a9e879bdf47a4d047d4e8762c6154f1a60fc62bbbfc4d17cd25d06c60aa5254fc92ae122e3a24e9b57e4bd3d50e274fb8b27d756215db0fbee54c1d0e06c96b32cf8f7aaa43f46dcab9b658fec6dd3db3413854b5d427d4127087d4032c3769daaa6e75cd470ea925a3e009562bd1558523c1a4e8f751c3d6988bf1800677b301768a15fbed8b68cc0355504b32798112008a4ae2b8ce1681f2be65cbe961f56c37eacde0febaf029e0afa26b3d6614d7947ad0437b53e15171fdd965bbdaab3c3fd92617fe3867da5c540441aad62d9dbdf66f229043ed506ee2ca360d7c41589567cf685fa3e0963f9ee5c5df6a31a442dab20234a3ce713750fc4bfedce77df595b5cdb581a6a9af979bdbe83640a7ffcaaa5a20182fec6acfe6f018208446bbb0e2b7422a910c640b29d48d8d75edd73b83b64dae90c9299eff07ef63710b155281955bd6d4caf142fa4da043a785dce28f7ce8153609c005bafafa0162308d43e9de4998faa0b8a00829f3081d0f24b8c6b7062cdcb2c39ca9d58d778fe43ad1e372fb1d859e5e906c300fefcd8ce3a967c7b362813e22aaa92df77aae1a7bbf7d224fe640629e95a8623698a490af42ce7080d0dcb827d0dd6e7fe0836c7803af549fe30a9d386a0b5c2fd3874df853a34c7ce1327b1339004c2588b158c83bbb25282a36e8bcfd2f40870c2f5fcb8d2f15a50cff8b0d5c072f8eb765c13ccf0dbbe907978af10921fb89cd75732e5daa7cfd07de9529fce13ee00101875823f8914caf52f88de5c46c27aed705e25e148ac85386d6383b530da1e8d6a4b50597d954fac2d7e17f3fe562d7fdfe336f63cc128c370b1e7114a30b38de461d68b1c711b85d1af246321c5ffbb761f6a90fd61b615620711510b27c4804bfad46d700dbffe24b0e9771a80cdd203251b033f94dfadc7ada6b9e72f97b129d1c5e43abbc212d4ae47b99700b252dff52d075414a1408c0fa72a8c49990735eff2510057f3a0670a83127094fc575b73e2ceca6a663b9932939ea11d3d2e50dd80e4f90d7e5ad35c0637442b5b6aab1d3032e63e34eac299712b908b27c68673a996e1dd09536e02aafb73495a38f0a4c1d12791fda691988da6eedd62509b55c5465a8a564e22ae92e3e8c150d9ebf8dc75688d52a0fc1db581bc1d868f77c7da1c6743ea8f9c6751e013277e38d298f7707dc8d136bfa28ddcb3eb25a45e393e93d295dc935d692aa4d0cd95bd0de00b7b2e1ef31a4b7ead9364a4ce4426322e9605200bc7dca3baaf99e4fe235dbeb30fd14bf7cb90be9fdaf510b7dd84594e3459fc022c5cdbdd4b94eb6a100ef7f9bcb2bb0f22aed40af6693816d55bb333cbebeda44b4b16102ac9bccb69fa807c5dc16325becca1d5216b470cfb9a099219fe7b43bf208338569fa01916fc8a73fd602f36913cfd079916bbd63d1167140257e5a33b14abf3f74efa1671d17a9f909fefebd4d6ec0f81e3725291ff71deb61a26c1a67a17394268eb15d72f218ff90e289d7dff563f97a6414c66656fb38ec7eb30c12bcbefaa8a2ce07b8c2f9acc76b813e33f7127c4d9fe9dda4c9f88d22f0e424ae5cf35ad9450c37cd74413e663a212c5e5fc383e92d0dead338f209590f81422a229daf356df923ea24c1477438b58782a6059ea89b771686fad1730a520f72549a7b29d30229097c0ba4f8af682bf72dd43ed277b47794e71e583152ece41e0d2d2382cbc68f38df5c644312ca20307535d671c518d3c1664ceeeec6b81614a6eb618f0a1381a1021b50dd1addd290a6dc73c1f85365243e7c16faeb922410b4083b79e9ac90eb5323f6e6917f8252f4abcd68041e8014b61c3cca0e8928f52df59fe8015e0c9ad04e13fa82181615bd80db6da60a61a66b4b00588078d8271d9068e83c202abf78396a19acdfcd5f25a9df67f35b1f366ef35c67ca97f0b81e5ea6d9b0e34378e7e0d70b0632cb4d3e27376238af7a05fd19c8b6d70b9f0357478e020ffe3aac9a50f048823e298104058ab9611dc6e09067d697bba2d1bf4e07c416d1108f04400661e94f97657b7c7d783658955c6eed0ff4e2220d2151ddc08e8bdf51104862e7d61b13421e88c5e7f659cd08aac1abf235c49513869e0ab0d0c010050b19ad417debf38634cf1080d900d0059159e696fea67ceb00a86e54a12d00bef46613ae17d216ac845f0df4a7a20d6b09f6969650a5a57bb4470465be69f3d0c52fcccdd218d030e505cf4b47a6ac721dc64b796fb3e24654082de1164557a79bc16f028ae65b83e1ebe6fe09fa43f983fbd5f9899f97f7037ea9e4e95457a4b23c5e18fc6666b9454e16df56b500d60c536ff5dc48bd625d22feb1bb6de0fa0cecf80619699950e37ef8bb40f86624c491039599dcc7354a3c4db2f0235c3f258fb39a049e033cd105b6508411b6cafe23de389384da23bc13d87fd8518b54dd29d32e3e5b2c43297fb1914477b8ed3be37154e12f1aa48448bb63972bc7c62c94f66d49b9fd5aab0944004f896b971b92048ec4883e030899699bbabc13091f0d659b9fae0e98e22e8c9d3718d17843db846bef6acf0aba917c218763688ca3e942fad9737fc5ac398cead77382d7923b6cabaca8d0e6458be120ca41ca2e231fd1ac568a91b4e6fae491b31e98cccbda4d85fd76788f9495f42267f396e4d4e71fdcd02b0f1a5a082a674ced72e7c978489ad2faef8fbe7333b6c758031d70dca183f06e60c3880ab3da2f516852906837f86ea9d27187f10f51937d2880d44cda7dbf36bc84946fe62d2af37e7b7584831001df2603f4ff645d3a34f4fa33e614b533a9c79570fa3b0fe21100f55ada43abe51566cb5670c73fa35475e399d64461ad736d4425885e362d08498ea6cd0ccd04f55cdf09e911182710a9eaab6b987668142fa37e7506d1d203517f77fc0d5a8db1ab2ffabfef0b291679f1c0a6c36a7702bced838089728b447c135e4feb88cf7e970663b6ea6daaf7788df14f7cea87a02f15b5661cca31aa575b8819a6c042c375926d455f85bec3cd9d32df88555814130cee928aabc4655ea0db7b7d70828596c3616e6dd8d140ce480786362aa3b33bc4857dbe8b6d73da20d3cc561147d2b4b4dba5fbda1f7708f4140f7ac2eeca2db46d7eef195be776bc7cba36640d473db0034e54df81829820b7c39d7f7678887b421bdebb124b1af15da3dbf0fde10c14c87fbbe66dc30b0de252d06d058e764a3a5f3c083809793a849d6bee4e64b8a780734b4e6989476f1e6a67115b08322de4b0499529eddba81e79943c0b3247dbb746f4ef335d682ea95b2a4bb5aa04c4afbc513382e1f3a5d5320bb48981a731264ef410ae431a98b844bd2532ccc9321fb7c729e7168e941ff5ce3162c5a337af1ef1c77644a36668eda5467e516c57b0e9e286ae904c1168b74b67c0271eddae6ac4021f3ce2028a2e7656e4024b42fcee49455c541860737421e2c384998150769e88cd3791fd30a568acabd9979bafb037bee8b843d4ce518578395749c24a5191570cf2cc5b939c87068f0c5187c82db5a1ccf46a61a8f05e707a65f836ee85d2a60315588bddff27dc5f6eb4942f8c59db47c625ab761a5b4f16d7fffe3b39b0cf85609a4d775f0b1b24faf95d0766a06641d804bcf3917a78e0810c371d490d73ca2ee80f8e232ed7d5c2d7c8d5e246d6f03442c308fcf", 0x1000}, {&(0x7f0000000000)="c655b4576fbf487f8d59d8c29a3a927f6c", 0x11}, {&(0x7f00000013c0)="4851128e7d1b165b501b22a9fabc32b20dfee4a910129ffb87c2655826911acb5f0d3dac7c42b62764832f819816707aff50bad18820cc83c21b26a7d04a25e27dd5f568b50404265b745c58b08bef9d74be44cc4d209afe05eb982f29a5ee76d30c02324831a06e775bb70116bf4d0ff35e672b64576a456a6ed9c4c643864d4fd65bc6ba3a7c7110d099c25cfc2e6360686e28b3c71e7e", 0x98}, {&(0x7f0000001480)="3a63a8db4ad013019ed462c4834107faf0413803a1b56695250ca39aae0dd3a09349", 0x22}, {&(0x7f00000014c0)="a430ca6fc2d1707bdb3085252bafc9b6c4621f8ea08bc808110e0e168fc5e52fbf41fbed52035b35a242cc8e1d7903881d8a4aa0b322515d959fc8dc7669faa717f23fdf1335a2af807f21de09e464004c2eeaa6056f02bccc66cca6ccd808364b609cc16391f9383e477689d6e1058a195242132f67d768cb20decfcee311368d377fda0ce674ec3e0bb4401ae2af142487b9271241884ff8afa128ebd1876c101330acb68e20f7e21b17f262a497de934b714d68afc07bc2de40cec692cdeb385d486bec7be3dffbe6704bb1a029328e70", 0xd2}], 0x8, &(0x7f0000001640)=[{0x70, 0x117, 0x4, "9c1ee86cd278b044325de77abda76d1b0d0bc4936afc34061da3f219625989b205906915306d6af0e71500f7347b0a38ec43214b3ea832a410e0316634ba1acef018b46d9afdad4259207351760fe34eb36738b7d75f71c825d207acfb6a84f7"}, {0x98, 0x10e, 0x8001, "ebaa936132cfd073da5bce07b14c6af1d4a919635b6edc693ead990e87028a425b742c26bca3a30563402af78955873f60f6a6d8c132a525833a80f5d6b70c33e4a80f27d18a219ee57bf86636153742289dd96b1b589be51d83946af4bd40bf558aa8ba47743d847d6ff6ebd0f8ee901ed624fff260d9e4370dcc3cf32fd08cb9fea5fa"}], 0x108}, 0x4}, {{&(0x7f0000001780)=@ipx={0x4, 0x7fff, 0x4, "662940d23c83", 0xfffffffffffffffd}, 0x80, &(0x7f0000001840)=[{&(0x7f0000001800)="c1ef8451358f30ac5e16e576c50cda53b7", 0x11}], 0x1, &(0x7f0000001880)=[{0x40, 0x0, 0x80000000, "58b6bbbac742dbba32b1ed1b0885057d486d0b930d7f08e52d52390c7f1253171675487e565abe47b43b922455ad58"}, {0x1010, 0x10f, 0x9fe5, "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"}, {0x68, 0x1, 0x7, "aabb240161f7a6b8b903a34ead698e0197e7d3da8ee213f8529681978bea08c483bfbfc848aee12181c18cbae35ed0c93e9aadf1d7dd4531c161e8c2f1b1b2845aebd8fce9b547c51ad83ebfaa3042b41f6d5e646433"}, {0x68, 0x10e, 0x800, "9c01a064fb032958a7bf28c81fbd84cbf7a89b5c72d8ec36eb5fdb6fe36a134ed098dee17bb8952875d81d0b703e04130bd41b92fa480dbfd40a111863dd64400dfc1386b1974a00f77d225383be2194b4cbe0e151"}], 0x1120}, 0x3}, {{&(0x7f00000029c0)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xfffe0000000}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002a40)="b0a4ced606136ab53f05e2a4a4caa7c0714f5734a4aee1d3752993c171118328bea05a5ccab1ed320b2c50e9e25a37f20fa65b0099d72f3b476ab66b2d1333ef41a57e2019af31ae5551dea1403f50eccc335422730fe4d958b4883842fdc74dcb210623ed8e9810db85d987474a088d5ce8e0ba20baa01eadda465a60a767112b94c348f4112248dc9caea05931f71979ebdae0cd799bf8e92cb05f2686db9a3bea5ece4eecedf7587678853a4a667138e661f64883f93b29d68180fa027eabbd790ed5c21f3c5d58d9c8c71d949fc1d5d50d6eb635350ecce32bab6b4c454a4cbe922fca0fab41f0", 0xe9}, {&(0x7f0000002b40)="a2bfd0d9def367d81734234e05b3ddc99d48bf30c918fe09e7b9c798ac59bb8718397eee97cf8da498b3f1409d3468c287b95e2ecc36b5f72f1e3cc462744eadb540066c842522", 0x47}, {&(0x7f0000002bc0)="36a97fe6e80842a585169baabe21d3a2ac948497a53dd0b2ea4b39bdc3aa64bd14d67cfe2618a3382057b6fe106a565e19684c6f2d5805e2555de84d19d692a39379c7ace4a86d69449a456aa63765dcdfa27fa481ff13634ab6be9522c4e0dbe4fcd7beb0a6f3efb28ea464f39f648d386441980ed1e0e712967d99ba280ce99adfcf35bbaa479c332863ea99e651345cf524de1d479bd2403d56edbbc2f4307ea0c28b399e4b599b927bc3484ac35236d572c8e65503120b6e136c7b17fac1b7469e", 0xc3}], 0x3, &(0x7f0000002d00)=[{0x38, 0x104, 0x0, "e8cd0130806b73f21220dd3b3956021cf28de32aa7a2c947ec438f06faadf1e5a5af04c64ecc"}, {0xf8, 0x0, 0x400, "ea1da6b4c7aba779761f6479520de4a91a0dd3e7e9b0b73110e3284c424f3a01b040884babf4123b9c9aef0793c9becf7353dc5ea3cbe24af992a70d33b51938328e92df309e6a880b13fd43a9e48780d59ea51796c703a55b5440a06a3f0f9417270d3510ae1247528b5b3cb53c7411893a4db560f1e544db7fc2f98666af49669119c9d050cfa735deb883bda7b6a4f97664a8bd02f54f298f1044a5b9a1f15209d06b387dee02e36cd21935b0d317795a3d702c92d04272157d56a416c35f4b200223270cdbdfac4758723ac903e7b90fbd16e8248fe4005793aab8a6ff2023f7d8b1"}, {0x60, 0x1ff, 0x101, "e6bcf36ebf5de6ad1964146963271ab47ce8f1fa370008c9833f147ebfe63725da2efffc6a6a78535413cb51694207f71fc0b1b187f97761d9fb26552a0902995d9944d3c32d902934697dac2b7cb00f"}, {0x70, 0x117, 0x9, "0562d455fc9402e08de6df70f5903920e8fba7bd2954858e1fd86c88bcf7fffec13ee1bb299bbeb273e061fc928b481fe71af988e8053974ce0329069b917ed363ddc5c8b1b2004622d63324051d2bd15a4f4b491dc02248512b6c39"}, {0xc0, 0x119, 0x20, "516a4ce039b8a101f4de168bb8135019ee16208282d1167971f608a3fcc48db810f508f4ee762ae1139a47b29ec6884579c12fc1c20d63412c9009db5b1548d5f5f99c38b6ad14cb130b034a9ffa1271f591ba19f87928dcad5e2db65df02744ce47fe4a0b76dcefba2b79809d7ec43d18447bf888259c16714778510f0927a02c24a3991a559d135229721c97e5c4043c0d1baf7020302e166e91d12cb5d65f53f9e3a8bac1fa15bd339047be72"}, {0x70, 0x1, 0x3, "098c2ecca5c2cafd3c6e3fd7097d6ce443424efc3f92fcb1e76aa7861cfe968293dce8a6e96cdcc564dc3fb04d2298439fb2887c15f757439231e48d5f3e380361d5b5e1d020e8c3d8b91055d0c78e2a0f64f68b9fada8a107"}, {0x68, 0x118, 0x0, "2714f2610679dffc645d02940f00d8a552098ddd578961c4b029cc2eae9ebb51ebac142b31027cb67eea521ea7e7e632fb2e65e6b30e73e89e1c23802d01c3de1ac3fa38829e8861fd8b0ef77f80c4228c01"}, {0x68, 0x10b, 0x1, "cf4e2a842f6139ad3bdb253cd360f8dfb847ce1846987506e2d9a192991358f8ace6216c4acc6d7da1b773fb6a025d8a8544987996ac85a89dc85a8bf9eb713e000e947d1ac86d99a1a24634f6aeb2a9a3255a"}, {0x1010, 0x115, 0x5, "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"}, {0xc8, 0x115, 0x238e, "4a6639f68dd27c533cdf1df8d48b9fc0fcf0f38012331c5a7ecb579219182bc1639a9c0a526a912d1abc00cb994bee925220a391c4021bac9b2a3f63076bc21e1bb163964d6f8c2a617b5757b4e54973e5f519d0faa17a2bb6fe2a339b8904ac8d4332942f9118773cac3248db6d84e98d4f16a07225fc8a28a6121c477fa1d2e482cfa8bd76cebce91bda412b16846849fc6c9473d6434a792ddac6c679da7eda632ee8c0cedcdb8c11bf8c637e742ed3242985e5e766"}], 0x14d8}, 0x7ff}, {{&(0x7f0000005f00)=@xdp={0x2c, 0x1, r1, 0x8}, 0x80, &(0x7f0000007340)=[{&(0x7f0000005f80)="44678f965c42e875f3ff5cf78b6b1b99ed7057c2359c91745028b0745fe424b841d513483b46e7f21de3707edc943c7845eca7ecead2dbc99dd69d84400f657e68e8912224a66f401d51e3e0d534a32a1d62a261e25704e5f63e6d12a831f77f65c1f6a76187de5e7c275887435e46aef5e4a7c6e87287b8c39db49faa81a61901ebfabef7ab90cb80bae1da094f6a32307b9e591997d1", 0x97}, {&(0x7f0000006040)="6908693b2c39c42a979c17a81ac305d2d6a37cca59b88dd4faaf2aaec78598bf9be603ea53e042eee89f3d62d3c06edae0073a49c318e1690d0b08e3a7e2e3dc4a642f7238058657cf9eb41f0f6f6bf8851049df02a47fca73390aea9c26c882116291821552b0aab4d0365c5d3ac463175e484c70e6322869d225efc4f34acc527c064f606581a5bbbefc2b2a63f1a465909258b9b05801d2033bbc581b0f78623bd66eae55a407504288f425455acbf159840ba8b06cfb3bb2c6b56a715cc9ec0e20383b0eed3c7d54c578a57471219fe969ffe6dcc9d8a7ebc1318280d8a8de56", 0xe2}, {&(0x7f0000006140)="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", 0xfa}, {&(0x7f0000006240)="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", 0x1000}, {&(0x7f0000007240)="911e9184f0987a1c8b40f871c3af93bc0e4eafc90d3f50b2504986aa1624564f2c28b5b7fcdc58a18ed758fdd61f81172d3cbccf5fc45d0b30fd64d28591a569a07ac347279e9087b7821f12daf6ba241c5de7cc9f6113b9f1ced652d33bf45ddc9f5d4986f6653ebfb0248386cad118f5e27e6e17fb44608ef8a5b65fe3fac25e977d891d7319f329269b6d96bb5ba47f5f67a39b31dac51a5f2ec2d7760b8379f527c58db0e8de9313a24b2a4bd6db582dd164a86996fdc31682e26b9bb83c2d7e5dcdb04b2fae1b6fecb7abbfb1ac4e", 0xd1}], 0x5, &(0x7f00000073c0)=[{0x60, 0x0, 0x1, "a7d9921a08a685c5c39852f9dea852d74d87d3128dc53e8a4694266827ae7b2037ebd94c9014a5dfeefe4838cafa8a378cc356a6a337debc0d6da0b45399ea87a8222c03cf45b44b60db7a722362"}, {0x1010, 0x11d, 0x7, "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"}], 0x1070}, 0xda}, {{&(0x7f0000008440)=@caif=@util={0x25, "174f10fd5439f13b77c4cf0c1cf2a794"}, 0x80, &(0x7f0000008580)=[{&(0x7f00000084c0)="afd7b5864bf7213eef2bf71e72e516a880bd81a43486a0aefd0a32a33f14c1aa0c67a6b26047004d07e324d9231be32fe60c1ecb90576598e24ece6ae7c8ef521836d3067dab0607b187b78034a7013268d64db410901eb51eb9ad247a1508e7711f1e85508b346c7d82f287572680897c960c855d56cd6c56478d009d68f3d7e4443dca576c12cbf0035083d629aed763f2d0d276258b1ee86a81fbf07d63303aaa7bc8c8693365460d62ecc05c1bf074b27da98358868cce7c8213217b5837", 0xc0}], 0x1, &(0x7f00000085c0)=[{0x78, 0x10e, 0x8, "4018c502fa4a79a5aea9d150b222a9fd846c1d3f0959ac993fa2ec67202239e5efc453cbfae6e33327d4010b672d80bed5285ee6717e06a41bb8f79712f1c2e2e1f37d7cd95c922fe0d603311a8817bbf83522fff0bc4cfb307660f5711f505be8594e"}], 0x78}, 0x7}, {{&(0x7f0000008640)=@rc={0x1f, {0x0, 0xca2, 0x8, 0x0, 0x0, 0x9}, 0x400}, 0x80, &(0x7f0000008940)=[{&(0x7f00000086c0)="b0502951bafd5ca470e89a53681b8e09b9a7b6d95cda185d26a7cdec882ac2ff1ea6d49b8510c6c3c4168d53a848ca7d521d0a9058e06e2244551f14cc81ca58a4d61df981666ad466fe5c08ae9247e066f0cede762fbfed5e5f06", 0x5b}, {&(0x7f0000008740)="29252488863c4ede5b7b9c11817d7880fa82bd", 0x13}, {&(0x7f0000008780)="2cf0f995e2402c6faf4a08744ec6b6c9ca2aea43f50246e1481cc6652b34339fcac01f5e3db01019ff9925b1f5850c3584505299f2776f47fc2281def56db376db776aee0ef8860008451f5e3e99f87203a856b86d1dddb7eb72589fb003b737cdb6a3e08d59c476e60b2fe6d18f507ece23913ca967573f7ebf94ebcc029653f512d3da699ba9d23fd0d8106707ac6c21e1d2bc6dfa19e4c92dc2ff40c7f8aa0e3ca1912a1097975d9bbfcd1d7a52c341028d78a426f4d5cfad04e51b01d6baa7a3db561b2aae70a176b3b146427022c62ce7ecce4b", 0xd6}, {&(0x7f0000008880)="8401ff00a60885d0cf1a7b6485b37bc25bb7c2f56ed840fe94b40f7892cb843cce9b814ba51103d25a64b9d16a7dd8c4058198eab028a81a6aba5002f50c1d7300cdde9dfc9d19bc9bfd616980202f4cc917b7e28e656e494688e7c7701657266185e60e107681e702f9d6f278043dc37f36a2594ea567cc56da4882e4549ae8aba95f77049bf3bd7d4d05623f6d90da956fdc0bce43c1917a50e2", 0x9b}], 0x4, &(0x7f0000008980)=[{0x78, 0x116, 0xfffffffffffffff9, "b257b810ab72be6cff7d69132be807d1fcb6ee936132bcc301b2b904e58386c9b410b293712b346de0e9ba3463c6e8675a37d2088a0608b6aef6a7276c6e4e6762a419ee91f1df526a6909273506ad16be3e6ae3fac2eaddf92ee99d038c9c6e38a2c0c8c3"}], 0x78}, 0x9}, {{&(0x7f0000008a00)=@rc={0x1f, {0x800, 0x3ff, 0x80000001, 0x3f, 0x20}, 0x4}, 0x80, &(0x7f0000008b40)=[{&(0x7f0000008a80)="82d3b6f4408188898cffa62109d89e3d5972b5bbf61f80276f635fc689cfc194a97da7b16ddb9d0833e647ce2af16a5087aa6e954cc45f437d96e773f67cbebe01f4f41d25d158c6ecbc88af5404e4f020f7252dcd661ea7c04307a821b6aca0fa9a113f6d0e81b0d88d939393c07ebfd2e6a4b759de9ab84c4a3080f26fe1eddd73d7c7a2c47f3cebc5e61a613b", 0x8e}], 0x1, &(0x7f0000008b80)=[{0x90, 0x0, 0x6, "cf712817a6c57f99beec9b949f0a3bc52ccc01ec14e594c73777eb3d71f99e4e8045d06f9ee655360bbd88fbc0ea99a8068dcc01bbb50a96f04a70ae7d40f410bae1a8b1bf3528207848d406ff24be9e9bfb9736b6561e83ebbc708837a88f9701ab1c4e01b3e4e9bbfddbe73befef39537ecf5f9dd340c816271707ae70"}, {0x30, 0x119, 0x3f, "be40c6ee9aa2d4e912414b2a79569fec80f16c705218ac7912"}, {0x18, 0x11f, 0x2, 'e'}], 0xd8}}, {{&(0x7f0000008c80)=@in6={0xa, 0x4e24, 0x1ff, @rand_addr="89011b092ac427d76d7fc457dd2976ae", 0x7}, 0x80, &(0x7f0000009ec0)=[{&(0x7f0000008d00)="2104a5e1f71a3941e1948e3ec334beb6ef178f37c17c2e6f1b5a846ea93ab449e7aa42d7f5eef015047c25cfbe3d0103ac15a28b6702ad2c0eefecbe40edb19a0c05043feb91c151efc9b2aff9f3043d6f1c506962f4c55af877d82c09384990036e6f0e7b73d139628df38881e6151592a8f05d843f303b6037f7c628a1044de5adfd45ef5a0ad7ebdbc17d29f38a6fb86abc0c1ec1abf2a6795ad2341669ac58cbbddecca2c3854051303e1f339565ce3c518c841181c3f362", 0xba}, {&(0x7f0000008dc0)="c22dd89c90eabf4c33b40b83632dcff3f76602668dbef9f38f17acb83dedcbaebf8b6c4a04130ee0e59f4ecac812bd10bc6e6c055e258579eae2c7b1717f68f04df699012942ff8e97524bc088f0df6e289a550aa8ae137644de98845e2b76b2b9b07c75f10b8455e64e863507170d1efe3e993a07a26704c2540fbcc5bf2c77dff3aea3a7b0b3cbd5102edce77d7f52d3ad2f5adfeca8f745705c093c13e22fec63e52a4d8f273104b84596e33cbe476a744b73645fc20cd3fbff59cf0bc2f9aafebbdb1142af4a1fd3d0459cfd23932a8e18", 0xd3}, {&(0x7f0000008ec0)="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", 0x1000}], 0x3, &(0x7f0000009f00)=[{0x100, 0x11f, 0xcc83, "9961207d8d7bc1b631e6a5d5b30572a146946f83cbe64fcb0037dc4a6ad128d2268f6277ec14c519ed0a21ff04f80457a09b346c9e8158509136241fde6234b4c76ab0ec50b874f4b04e0a1c91ae531fbd10fb571af7bbc1df5caceeffd622e41c0967f301de289f61da1b4f1290cb8a5ff5d5f237e090c7fc899af1230b30a6653ebd9c8009951a36df64b96d0234b7270f91a3cf7e7c82565306239b9625908674477e06ed2a061a1e403b1a59dd720a8af37774799dfcb5521ddd28f39b5edfde8af7a2b7c6a15ac63b7c29ee5a82c2ec14d307a6a32ba37be4b814bf2c70f616831f09590a70a1"}, {0xe0, 0x115, 0x9, "e5239e4f170a37ee23f8596bb8411db5e6f04a2fc968cc2b9bfb87ef578e96fc5c21443b014f5413cb2d98edfd90c47c36edfbf34c402b3610d71f73f8a55085ed99858347b2455a8a7088d5ca5f1a2f8f493afa2bdc7193c5757dcfcf751bfd27986819dac29a29f614959eb36ba28e0dd536f7c7fd80ba19c5dbc7eb464e756ef9434ee1b234cb73bd7d8868d5c7a9b500043f193cddcbbc44828ba156868c4f051d00cbadd8e0863c48f0ab017ebb334b19ebc2189b0c1f96f1ced40e85f096201c069be501229d7e6203"}, {0xa0, 0x18f, 0x5, "27f198e8bbb37d301f9a66c5e95c19747959a55595801b26b1bd1291deb8e9bcec94d8b1daa3e859eafc0369d6174e441060424ba21cce45ce02f99064167ca63a8a35e12211716eeba3bd9c8224c6c1e6b016ec268363d045465472307253071769207586be424924d5c59e9f8a9e3e5e070f276c5c4f592815346d5fdaef8930c6c0ba5ef35137101bb15fd206"}, {0x40, 0x1ff, 0x1, "cf0ba840ffa9190840f9001212d8bc86c2c8345d048397039912d5b1ec5b0d0967cebc56cb77b681e0"}], 0x2c0}, 0x8}, {{&(0x7f000000a440)=@can={0x1d, r2}, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)="1c71af0f2e8ea43f1619ebb106de7887d099b232223f4dfa7119b0293081fbc9c1d2e17c8e5c7ca412bff52f3a94e832be0c5782ba69374fea6660d8270a84f558895e693db4552d1046ba47a0f645b73359ce2e2694c0019c6911a36a5ef6495f43ead50a98af129737d7ece97f15ac570c1cd796906b9c4261537de0364098acd23708dc92f5394173f7782c3fa54efde8e29c7e01d814da42813fe41a2cfea222663ae8a64f65325dc0f01679231f736d97971798047536ff0ecb08c6ee", 0xbf}, {&(0x7f000000a580)="24f78fa9e998c34a71de55bcad2947c6534c80e1fa380045504ead39013e3777686a752c5a66e8cfe1b999548fa5f2f792b69d06b2", 0x35}, {&(0x7f000000a5c0)="4a450bd22e5c8f0cd6e65859026686e527e6e0f7dac832d9ef387703554ef4171e2acb42bc4343141c3dd478c6da497737b0f5dd59db4ffd1bd1278fdb38d75dd9e1f1532ff45154fd2557c8ee28e5", 0x4f}, {&(0x7f000000a640)="730c0ba692d6ec62af87f67ce0e1bcd1c39f2ced465a4b6716e1473d31bb04776854bb0fbdd89c902a9f19cb3849f5e97dc837fe6843a1f488713453f52c5e56e7b74e8eddbd3379537eafc47e1075f108915521f43772187da1134982c5e63edb673ef2c088", 0x66}, {&(0x7f000000a6c0)="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", 0x1000}], 0x5, &(0x7f000000b740)=[{0x38, 0x117, 0x1, "0b65d06b38d5679c13dae029381fdd099141cc7c5339a9a673ccf6e1123e85d4fcd5c7e5a49d99b2"}, {0xc8, 0x110, 0x8, "9286db6748dfc2b19c69d3c2841dfc95b3afed4126a98d94229dfd17604838d1bbcd042745e80f43d8611c74b3e86d9f729a100b7691a70bc8188ca1ff709165865ccef43a8b87cdc3b11795d3f1d2d20a553a55d4512eaa797aae7497cc0a6ff2af742fd68338efac11b3b84d14b8abf7a75ee05b4f0ed5ee3b4d6c044c839e5d3d4e563dc67769f11dd0407a801447f931e4c692e3d51644eb912d80d75c86ef0ad19b0a65e809886332a54a613061d63c7659f2fd"}, {0xf8, 0x84, 0x2b22, "f0d2c98e6df930ac8cd344ee31b7fa54c09c1b6de6c34c7e48627c935b219411dafa37debff5685e2f158f718c27a83b38e730352d04c731d352af2b285fe1b61c3eb8aa01cd3468d20bcfb12d36e95b637d85548d30590b758f5db84698da0d636fdf552add6153a619cdad967ea080d2ad27c299c4777224f8362ef37be14f9640fc39efc1fe292d17085356128bc2248e3b7f6eb8afc36be99c41ab3c5e618069a4acc3246eb11c16c623044f5514d7bebae130954b5683c0567d8e152da259057c5d8001426cadc9d496454c9f970f61208b1a6675855466518fa3f36ba499fe0e080f8e"}], 0x1f8}, 0x3}], 0x9, 0x80) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 337.910376] QAT: Invalid ioctl [ 337.919701] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 337.929971] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 337.942455] Error parsing options; rc = [-22] 20:03:50 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x10100) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) bind(r0, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x2, 0x0, 0x4, {0xa, 0x4e24, 0x9, @mcast1, 0x3}}}, 0x80) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='loginuid\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x4, 0x8}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e21, @empty}}, 0x6, 0x80000000}, &(0x7f0000000480)=0x90) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x40, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/61) read(r2, &(0x7f0000000080)=""/243, 0xf3) write$P9_RREAD(r2, &(0x7f0000000000)={0x2e, 0x75, 0x0, {0x23, "8ee05012114c25a021f9f39628964c7ac330734250e99e2d0e003c71d5c62e3a038f00"}}, 0x2e) [ 337.959555] QAT: Invalid ioctl [ 337.975827] QAT: Invalid ioctl 20:03:50 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x2) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:var_t:s0\x00', 0x1b, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) acct(&(0x7f00000001c0)='./file0\x00') r1 = geteuid() quotactl(0xf01, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000240)="7f512733311bb33441c22dff8d6e01a957e590201fd90881bc11140bcddb386f260d64db38fa7ba94c3d2de48e7a6c32500fee7d75f116be708018a1180005a64c05a6552caef1fcafb4e22665e0") 20:03:50 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x3c, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffffffff00000000, @local, 0xfffffffffffffffb}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r1, &(0x7f0000000100)=0x4) 20:03:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mq_getsetattr(r0, &(0x7f0000000040)={0x5, 0x7, 0x2, 0x111, 0x0, 0x4, 0x2e, 0x7}, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 338.154098] Error parsing options; rc = [-22] 20:03:50 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000240)='G\x10L\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000200)='G\x10L\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1c9d5b88522838bf57cbaa4741435ba1b72bb663e4a92fe3ef039b78d7ea31aa124043c429df525fe537254be9"], 0x2d) write$cgroup_pid(r2, &(0x7f00000002c0)=r0, 0x12) socketpair(0x20400000000001, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 338.232877] Error parsing options; rc = [-22] [ 338.237732] QAT: Invalid ioctl [ 338.263712] QAT: Invalid ioctl [ 338.285329] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 338.294544] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 338.307094] Error parsing options; rc = [-22] 20:03:50 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecry\xf4RbwQ\x80\"q\xae\xb2\x1d%S', 0x0, 0x0) 20:03:50 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000240)='G\x10L\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000200)='G\x10L\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1c9d5b88522838bf57cbaa4741435ba1b72bb663e4a92fe3ef039b78d7ea31aa124043c429df525fe537254be9"], 0x2d) write$cgroup_pid(r2, &(0x7f00000002c0)=r0, 0x12) socketpair(0x20400000000001, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 338.444915] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 338.453943] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 338.466672] Error parsing options; rc = [-22] 20:03:50 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2082) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000040)={0xf, @raw_data="f639ce61228612654f97ded2547c59bfcefdba92b1bf0a6b2ef6f029263819ebad8725998ee36b1d5a3a1ca21a94d29ae8ed4fcb7e0a594639239af82ec178ea2db8828a3d1c9dcfe268b2e4dff59a91b58b9491dfe9bcebcf75a507856c238092dc9178d5196ff70fe3ef3b0c7b18111a72fe0be663db6a3990ab88a66ccb105ad753d70cf60c2403b9e210483b385518ddf91aee9cfd5333affaf6c50f2b5cc5bd0ba0efd7bd0cd90f374fee3d131270b2dc8cd845a18337955c7b2744e8ff658f67bbd6296b58"}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000200)={0x0, 0x0, 0x3007, 0xb5, 0x30000, 0x4, 0x5, 0x1}) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000140)) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) 20:03:50 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x12, "94d902bafd15200464b1e17ee0ca637ea5c0"}, &(0x7f00000000c0)=0x1a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e22, 0x100000001, @rand_addr="d03fb86636bb53b4f72182e7c524dc7f", 0xf17}}, 0xfffffffffffff82c, 0xfffffffe}, 0x90) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 338.706269] QAT: Invalid ioctl 20:03:50 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000240)='G\x10L\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000200)='G\x10L\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1c9d5b88522838bf57cbaa4741435ba1b72bb663e4a92fe3ef039b78d7ea31aa124043c429df525fe537254be9"], 0x2d) write$cgroup_pid(r2, &(0x7f00000002c0)=r0, 0x12) socketpair(0x20400000000001, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 20:03:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffffffffffffd, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r0, 0x6) [ 338.742393] QAT: Invalid ioctl [ 338.746441] QAT: Invalid ioctl [ 338.786710] QAT: Invalid ioctl [ 338.793873] QAT: Invalid ioctl [ 338.816351] QAT: Invalid ioctl [ 338.840079] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 338.849081] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 338.861795] Error parsing options; rc = [-22] 20:03:51 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) close(r0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000000c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:51 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 20:03:51 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000240)='G\x10L\x00', 0x0, 0xfb, &(0x7f0000000100)=""/251}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000200)='G\x10L\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="1c9d5b88522838bf57cbaa4741435ba1b72bb663e4a92fe3ef039b78d7ea31aa124043c429df525fe537254be9"], 0x2d) write$cgroup_pid(r2, &(0x7f00000002c0)=r0, 0x12) socketpair(0x20400000000001, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 339.124795] Error parsing options; rc = [-22] 20:03:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2010100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_delrule={0x78, 0x21, 0x300, 0x70bd29, 0x25dfdbfd, {0xa, 0x10, 0x30, 0x7f, 0xd1b, 0x0, 0x0, 0x6, 0x10}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'syz_tun\x00'}, @FRA_DST={0x14, 0x1, @mcast2}, @FIB_RULE_POLICY=@FRA_UID_RANGE={0xc, 0x14, {r1, r2}}, @FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e24, 0x4e22}}, @FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x4, 0x9}, @FRA_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x26}}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x10) 20:03:51 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) ioctl$RTC_VL_CLR(r0, 0x7014) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x3a86) [ 339.216660] Error parsing options; rc = [-22] [ 339.291187] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.300249] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 339.312849] Error parsing options; rc = [-22] 20:03:51 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x40) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 339.383391] QAT: Invalid ioctl [ 339.392887] QAT: Invalid ioctl [ 339.398460] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.407508] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 339.420022] Error parsing options; rc = [-22] [ 339.429532] QAT: Invalid ioctl 20:03:51 executing program 3: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000080)={{0x9, 0x5, 0xfffffffffffffffc, 0xffffffff80000000, 'syz0\x00', 0x6}, 0x5, 0x12, 0x9, r2, 0x2, 0x8000, 'syz1\x00', &(0x7f0000000000)=['$*\xb0^\\-ppp1', 'eth1bdev\x00'], 0x13, [], [0x200, 0x8, 0x2, 0x5b]}) mprotect(&(0x7f00002a7000/0x1000)=nil, 0x1000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000400)={&(0x7f0000110000/0x3000)=nil, 0x3000}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x4, 0x0, 0x3000}, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000440)) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000010}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_getroute={0x50, 0x1a, 0x100, 0x70bd26, 0x25dfdbfc, {0xa, 0x0, 0x0, 0x7fffffff, 0xff, 0x0, 0xfe, 0xe, 0x2000}, [@RTA_METRICS={0x8, 0x8, "624f12db"}, @RTA_EXPIRES={0x8}, @RTA_UID={0x8, 0x19, r3}, @RTA_GATEWAY={0x14, 0x5, @rand_addr="10dd70b376d0affef90575b47ca8bdc6"}, @RTA_ENCAP_TYPE={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) [ 339.465335] QAT: Invalid ioctl [ 339.496972] QAT: Invalid ioctl [ 339.500423] QAT: Invalid ioctl [ 339.533197] Error parsing options; rc = [-22] [ 339.573003] Error parsing options; rc = [-22] 20:03:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:51 executing program 0: r0 = msgget$private(0x0, 0x144) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000000c0)=""/204) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x9, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000080)={0x1, 0x2, &(0x7f0000000040)="98092988c4b3c60194d686bff69333fe0245b80b9a64029ed7ce5c2a39e01c1f5ec800edc16aea358e5602b455c8a80e510a304823d09e4b268a2ae018", {0xffffffffffff0000, 0xffffffff7fffffff, 0x49433553, 0xd, 0x9, 0x1000, 0xc, 0x6}}) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) 20:03:51 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000200)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x2, 0x0) accept(r0, &(0x7f00000000c0)=@ethernet, &(0x7f0000000140)=0x80) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000001c0)={0x0, 0x8, 0x1ff, [], &(0x7f0000000180)=0x2000000000000000}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x1) [ 339.738741] QAT: Invalid ioctl [ 339.744871] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.753832] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 339.766299] Error parsing options; rc = [-22] 20:03:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) ioctl$TUNGETSNDBUF(r0, 0x800454d2, &(0x7f0000000000)) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) [ 339.794843] QAT: Invalid ioctl [ 339.814296] QAT: Invalid ioctl [ 339.851475] Error parsing options; rc = [-22] [ 339.876749] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 339.885694] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 339.898242] Error parsing options; rc = [-22] [ 339.935109] Error parsing options; rc = [-22] 20:03:52 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@local, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r1 = syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x89e3, 0x40000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000740)={0x8029, 0x1}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@loopback, @in6=@initdev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000c40)=0xffffffffffffff7c) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000780)=0xffffffeb) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x3, 0x3d2d, 0x2}}, 0x28) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000006c0)={0x0, 0x1, @raw_data=[0x401, 0x3ff, 0x8, 0x7, 0x8, 0x2, 0x75, 0x2, 0x10001, 0x1, 0x2, 0x100, 0x101, 0x9, 0x4, 0x2]}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getgid() getgid() getgroups(0xa, &(0x7f0000000600)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xee00, 0x0, 0xee00]) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:52 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) unlink(&(0x7f0000000040)='./file0\x00') [ 340.097475] QAT: Invalid ioctl 20:03:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\xd1\x1bF\xcclup\x00') ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x80000000, 0x5, 0x9, 0x10001, 0x1, 0x2, 0xfffffffffffffffd, 0x5415, 0x80000000, 0x2, 0x0, 0x7fff}) exit(0x0) pread64(r0, &(0x7f0000000240)=""/100, 0x64, 0x4d) 20:03:52 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\\++.\x00') [ 340.180174] QAT: Invalid ioctl [ 340.204971] QAT: Invalid ioctl [ 340.225073] QAT: Invalid ioctl [ 340.256704] QAT: Invalid ioctl [ 340.268082] QAT: Invalid ioctl [ 340.292161] QAT: Invalid ioctl [ 340.302996] ecryptfs_parse_options: eCryptfs: unrecognized option [\++.] [ 340.309917] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 340.322543] Error parsing options; rc = [-22] 20:03:52 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0x7fff}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:03:52 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0xffffffffffffffff, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000), 0x4) 20:03:52 executing program 1: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x4, 0x8972, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) [ 340.537420] Error parsing options; rc = [-22] [ 340.553998] Error parsing options; rc = [-22] 20:03:52 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x1, 0x0) [ 340.620862] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 340.629791] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 340.642294] Error parsing options; rc = [-22] 20:03:52 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 340.679975] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 340.688964] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 340.701469] Error parsing options; rc = [-22] [ 340.748928] Error parsing options; rc = [-22] [ 340.789654] Error parsing options; rc = [-22] 20:03:52 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000000c0)=""/122) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) prctl$PR_SET_PTRACER(0x59616d61, r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000100)={0x2, 0x49f, 0x1, 'queue0\x00', 0x3774d319}) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x400) 20:03:53 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0xf001, 0x5000, 0x6, 0x8, 0x4}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) [ 341.035937] Error parsing options; rc = [-22] [ 341.067438] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 341.076564] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 341.089178] Error parsing options; rc = [-22] [ 341.123421] Error parsing options; rc = [-22] [ 341.124242] QAT: Invalid ioctl 20:03:53 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) unlink(&(0x7f0000000040)='./file0\x00') [ 341.173566] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 341.182554] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 341.195044] Error parsing options; rc = [-22] 20:03:53 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) 20:03:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000140)={0x4, 0x4, 0x83, 'queue1\x00', 0x6}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x2, 0x1) semctl$SETVAL(r1, 0x3, 0x10, &(0x7f0000000080)=0x4) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) [ 341.356483] QAT: Invalid ioctl [ 341.367340] QAT: Invalid ioctl [ 341.380041] QAT: Invalid ioctl [ 341.398205] QAT: Invalid ioctl 20:03:53 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) unlink(&(0x7f0000000040)='./file0\x00') [ 341.416949] Error parsing options; rc = [-22] [ 341.485698] Error parsing options; rc = [-22] 20:03:53 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_1\x00', 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x6, 0x3ff}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in6=@local, 0x4e21, 0x0, 0x4e24, 0x40, 0xa, 0x20, 0x80, 0x84, r1, r2}, {0x3, 0x0, 0x5, 0x6080, 0x1ff, 0x8, 0xb1e7, 0x3f}, {0x7, 0xe2, 0x400, 0x4}, 0xff, 0x6e6bb9, 0x3, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0x7e}, 0x2, @in6=@mcast1, 0x3507, 0x0, 0x0, 0x8000, 0x4be, 0x10001, 0x3}}, 0xe8) 20:03:53 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x1, 0x20}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x386, 0x3, 0x8, 0x7, 0x101, 0x40, 0x2, 0x0, r1}, 0x20) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x483) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) unshare(0x40010005) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x8, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000005c0)={0x0, 0x9, 0x1000, 0xffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000006c0)={'veth0_to_hsr\x00', {0x2, 0x4e23, @empty}}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000540), &(0x7f0000000580)=0x40) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f00000000c0)=@ax25={{0x3, @bcast, 0x7}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)="f13f27a446759b5ce6c778cf20a978ee2594458c15638320b348dc133fe029782cb126718b00752a4f4adffa8509ba4e2f97e14982b96a31ed63cf077cc76b", 0x3f}, {&(0x7f0000000180)="357413a7be3dceb366ad33e1f7b3f6225a370075706d7e159d42e302c8fef01e152afa84a94a8f23117c14265383bee1b5ec2c1b0e", 0x35}, {&(0x7f00000001c0)="32e0965d673b4c1ba351c639e634ef12aa7d26ed4b3ebdb81c32df18f7e4561526fe31e1b7ca6a9616b30297ca1dd86ed2a8381cceac309f64ebed9cd1b0aa67d497fef7830b0e561a0b0377e0d9b6cba56346ea519990b127cf8d4570d60502b5f1726b023ac19459a176661efc04e05f30670630a6b980149b9d8027bba7449b690b29ed9ef8ed2c1bcc3ba774adb0257773c5d8c526028f7822eafc28e8197e1dbb2eea37811f92326164366f801c16c3cf1dd7f0f3b7af6ceb9c5edf74d304b586bc3a7ebfbb2c6ba7a9ce6a5932f141cf7d0b1cea8966a906c8040e3caf57fe0fb1aceb2dbb5d654454edf5da1ae33573232f329c7513", 0xf9}, {&(0x7f00000002c0)="a4275b8b2f097260fc25354c35bc31726bf5c5ff9ea4b75726dfe6351dd2ec7a6d1ce99f451f717603e7817e70a3ced902c6f393e0d45b8d645df15c20255fc87064dc8f452a8dc0b609ec8bc41c720671d3820255fa798e044811666e71eceb9c5c99e8e1da9a7a59ac23175eacfd6d4f10a9a7b1105cf3a4f88cab958cb38d4eb6fa8e332ea6b65d38bb2ceb131f8251beae4c63831c91f6bbfb359ffc6e881408b069dd0d1a59268138d93cf7a66cef54b8a71ca520c2848ee2f8e6efceb3272f2858450d40aa6ffe42c2e16f3ecf60aa71de0e88ca9c2a358ddaa574de22357896cc0e0e3d92bdfd5b122dac", 0xee}, {&(0x7f00000003c0)="ead6b47f78a788a0d17f724872c8c875a03eb72d23169d9b5ce3c2e79f38ac19f3723b86b5", 0x25}, {&(0x7f0000000400)="2cbd1796b8759ba3585994061b6b22a841141baa307aaab73bcf504c78016829fa09dcb671183f4780dc91d6c3d7238c547c06871baa0913ff88ed0c5951e14475eaa178f037815926cdb4e2eb58e0ca5064b5b735abd21f8c6f436607c7e5b817643f493ec4f551a525d0a6e3f213bd0f8fa25f98237daa2725cd376c4b74638dd81f17d8aff032fc2582e4627a9f9d05111540a3744f62cbd455cc23f86bf2b6335fa9ca3d1743f5576e998f10", 0xae}], 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x118}, 0x4004) [ 341.697126] QAT: Invalid ioctl [ 341.700740] QAT: Invalid ioctl [ 341.735295] QAT: Invalid ioctl [ 341.738932] QAT: Invalid ioctl 20:03:53 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) unlink(&(0x7f0000000040)='./file0\x00') [ 341.744375] Error parsing options; rc = [-22] [ 341.755372] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 341.764394] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 341.776943] Error parsing options; rc = [-22] [ 341.816205] Error parsing options; rc = [-22] 20:03:53 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:53 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x100}}, 0x18) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000300)={{0x1, @addr=0xffff}, "7efec0f84a5a23c5e742ed37a6e12fcd2bfc7bd0911b1052839e7249090c6cd7", 0x3}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000400)={{0xffffffffffffffff, 0x3, 0x7ff, 0x1, 0x7}, 0xfb, 0x8, 'id0\x00', 'timer0\x00', 0x0, 0xffffffffffff1943, 0x7, 0x3, 0x9}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000500)={0x0, 0x3}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000580)={0x4, 0xc, 0x6, 0x7fff, r2}, 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00', 0x4}, 0x68) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000640)={0x2, 0x85, 0x800, 0x100, 0x7, 0x2, 0x79, 0x4, 0x4, 0x2}) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000680)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0), 0x13f, 0x8}}, 0x20) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000740)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000780)={r3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000007c0)={0x0, 0x0, 0x4}) ioctl$int_in(r4, 0x5421, &(0x7f0000000840)=0xfe2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f00000008c0)={&(0x7f0000000880)=[0x0, 0x0, 0x0], 0x3}) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000900), &(0x7f0000000940)=0x4) tee(r0, r4, 0xffffffffffffff01, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000980)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000ac0)=r5) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000b00)='trusted.overlay.nlink\x00', &(0x7f0000000b40)={'L-', 0x80}, 0x28, 0x2) recvfrom$unix(0xffffffffffffff9c, &(0x7f0000000b80)=""/157, 0x9d, 0x10000, &(0x7f0000000c40)=@file={0x0, './file0\x00'}, 0x6e) ioctl$LOOP_CLR_FD(r0, 0x4c01) sched_yield() ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000cc0)={{0xfd4c, 0x6}, 0x1, 0x0, 0x200, {0x9, 0x80000000}, 0x20, 0x9}) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r6, 0x40485404, &(0x7f0000000d80)={{0x0, 0x2, 0x0, 0x3, 0x3}, 0x5, 0x1000}) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000e00)=0x0) ioprio_set$pid(0x3, r7, 0x0) 20:03:54 executing program 2: umount2(&(0x7f00000001c0)='./file0\x00', 0xd) r0 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) socket$kcm(0x29, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x800000, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x1ff0000000) capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e0000002ac14140ae205460003001800ac141400ac1414bb000000001729c2c9cdb1caee67062049007cc7f04db00a16fa7143ddb33456600e2a3de7d7af762cf9da6b28b073f3d32ca52f0bb2f0af72e3c0a6f23efe0ee7f679e4580d1b2c29bf3a73853049beff1b2b6de37aa74688a4eb6fe46fa9b008fa3065c854c623cc761275cd1a846b0cf6b108199b1de05657d661ae149539184a03871b8902203bfc7e8c4e91e1ab80075a40e5a8d5571394fe"], 0x1c) setsockopt$inet_mreqn(r1, 0x0, 0x100000000000025, &(0x7f0000000380)={@multicast2, @local}, 0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='veth0_to_team\x00'}) socket$kcm(0x29, 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000600)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xc9) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000200)) 20:03:54 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) [ 342.006195] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 342.007891] QAT: Invalid ioctl [ 342.015246] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 342.030951] Error parsing options; rc = [-22] 20:03:54 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000280)={0x1, 0x1}, 0x2) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0xdb, "9f67e60ce4f73f1c7f5782cd7450df051e1de9873d7d966bbdc00382c67219f5448715d3ad26fb5da7b087be61d73dee633e39c9416ce3d22cfafd7fa1039313d1e41efeca843f2d4adfc359b52dda066676445ce957284d99941af76d0aac51a0e2396609293512e831f0e87da5d85e68165347fb9c9c5625e31ad0ed4efcac19f7f22b91938d25f4154df2caa4d343953787003ac1ad6161703502f43ea63d23acafe5f22a867c9bb7c539a24e4352e1193d20ed47d8140be2f26a57a842c333d37aec67194f21ca29690de09d87c89534304cc20620d7257a7c"}, &(0x7f0000000200)=0xe3) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 342.196053] Error parsing options; rc = [-22] 20:03:54 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x3}, 0x203) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0x7ffffffd, 0x1, @value=0x3}) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0x100000001}, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000000c0)={0x1, 0x2528}, 0x2) [ 342.323295] QAT: Invalid ioctl [ 342.343622] QAT: Invalid ioctl 20:03:54 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='ppp0(\xcf-@vmnet1\x00', 0xf, 0x0) 20:03:54 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, 0x0) 20:03:54 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xffff, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 342.508658] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 342.517676] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 342.530182] Error parsing options; rc = [-22] [ 342.616076] Error parsing options; rc = [-22] 20:03:54 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x4, 0x1, 0x4, "ce6efb24a676900864873ae0f76088a83785ac3e569dfaafe3064dca96eb4c10b8130a4e5c93ab3393ca044b75545c83854c4930a0c3ca0163b906f0d6"}, 0x4d) 20:03:54 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000240)={0x1, 0x0, [{0x4, 0x7, 0x0, 0x0, @msi={0x9d95, 0x8, 0x1}}]}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x4, &(0x7f00000000c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r4\xb2\x8d\xa4[5\xba\xfc\x11\x95{)X\x8b') 20:03:54 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:03:54 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000180)='@*\x1fuser}$\x00', 0xa, 0x1) [ 342.937501] QAT: Invalid ioctl [ 342.942744] QAT: Invalid ioctl [ 342.972634] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 342.981488] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 342.994132] Error parsing options; rc = [-22] [ 343.003702] QAT: Invalid ioctl [ 343.042083] QAT: Invalid ioctl [ 343.080821] Error parsing options; rc = [-22] [ 343.098901] Error parsing options; rc = [-22] [ 343.272245] IPVS: ftp: loaded support on port[0] = 21 [ 343.481093] chnl_net:caif_netlink_parms(): no params data found [ 343.553320] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.559903] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.568683] device bridge_slave_0 entered promiscuous mode [ 343.578587] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.585323] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.593984] device bridge_slave_1 entered promiscuous mode [ 343.632725] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.644825] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.680074] team0: Port device team_slave_0 added [ 343.689649] team0: Port device team_slave_1 added [ 343.857758] device hsr_slave_0 entered promiscuous mode [ 344.022592] device hsr_slave_1 entered promiscuous mode [ 344.269069] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.275751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.283138] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.289728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.392095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.418606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.429991] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.441269] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.457583] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 344.481182] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.504342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.513353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.521561] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.528213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.597735] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 344.607562] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 344.626048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.635109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.643764] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.650284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.659601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.669138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.678874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.688053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.701851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.710918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.719890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.728363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.737438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.746132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.759618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.767977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.811011] 8021q: adding VLAN 0 to HW filter on device batadv0 20:03:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_crypto(r2, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@del={0x110, 0x11, 0x400, 0x70bd2d, 0x25dfdbfd, {{'sha256-arm64-neon\x00'}, [], [], 0x400, 0x2000}, [{0x8}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x1ff}, {0x8, 0x1, 0x100}, {0x8, 0x1, 0x80000001}]}, 0x110}, 0x1, 0x0, 0x0, 0x40}, 0x20000090) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x24802, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000340)=0x2, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000080)=0x2000, 0x4) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x2) set_tid_address(&(0x7f00000000c0)) 20:03:57 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x3) 20:03:57 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000400)={0x1, 0x0, [{0x0, 0x9, 0x0, 0x6, 0x0, 0x1ff, 0x8}]}) write$nbd(r0, &(0x7f0000001580)={0x67446698, 0x80000000006, 0x4, 0x6, 0x400000000000000, "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"}, 0x1010) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendto$inet(r0, &(0x7f0000000300)="e6e7d6eefd69a0484ecd7e79c8896132dca84208bbcda6d390148ec6c13e6454ed9b9743e27ee66b8d489f9904b8244db138429ce7", 0x35, 0x1, &(0x7f0000000380)={0x2, 0x4e24, @local}, 0x10) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000240)={0xa0, 0xfffffffffffffffe, 0x2, {{0x6, 0x0, 0x1, 0x9, 0x100000001, 0x4, {0x4, 0x0, 0x570ddae, 0x80000000, 0x8963, 0x6, 0x1, 0x5, 0x7, 0x8001, 0x3f, r1, r2, 0x9, 0x2}}, {0x0, 0x4}}}, 0xa0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x5, 0xecd3, 0x4, 0x31}, 0x8) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2183}, 0xfffffebe, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x4, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80040004}, 0x20000800) 20:03:57 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='7\\\xe1\xc458\xaa\xa2\x17b\xb1\x18\xf0\x9a\xd5\xe8\x90\xaf<\xf4]\xcc\xdd#N\xf9j{\x7f\xc7\x19\xc8\xc2\xd0\xe4$Y\x05\xc5<)\x96\x91}\xdaJ\xb2\x7f-\x87\xa5\xc1p\xe3\x98{\x81\t\xfe\x03\xb3N\xe9\xa9oA\xf6\xe5S\x80\xc0U\xcb2\x85\xe6H\xf9i\x83\xc7\x1b\xb9\xe4\x17\vq\xfb\xab\x00\x87\xc6]\x8f\xf0m\xdf\x1cRHe\xc8=\xb0;\xcb\xf6L~\x1c\xc5\xe8OpI\xd4lbx\xfbE\x00e\xd6\xf8\xe8\xdb\xbc\x99\x19\xd5\xfc\xea\xb7\xbat\xdf\xedW\x94D\xba\xb3P\x02n5U\xb6\xd5\xcb\x1b\xc0\x93\x03\x9e\xfa.\x97\x03\xcbOV\x17.\xdf\tJI\xce`~{\x1a\xa0\xd5\xb1U\x16\x15\xf5=\xabht\xac\xa3\xf8=\x80\xcdy\xd1\xf6y\xe9j\xf5\x12\xb9\x1c\x19\xf3^iys\xa5\xd2\xf7\x16\x1fV!JG\xdd\x0fDB\x13\x99\xd8\x14_\xf9\xfd9\xc1@\x83\x11>\xca\xacq\x8e\x83\xe9\xb9(\x15\x05i\x83V\xfeg\xcf\x96\xb7\x96o\xf4\n\xaeBU#BI\xb2qf\x12\xc9\xca\xad\x02\x18K\xdey\xac\xc2\xcf\x04\xe4\xb7?\x88\'\x15\f\xc1\x93Y\xc5\xa3J\xa1\xe5W\x83\x95\f\x17\xc4\x03\xbe\xf9H/2\x9a\x813\xb1\x17\xc1\xc0\x90f\vw\xe1w\xbbi\xc3)H\x1e\xb2\xd6\x8f\xa4k\x98Z\xcb9\x19e', 0x0, &(0x7f00000001c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\rg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x88\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl0\'v\xe7xT\xb0\xb1\x17\x04\x0e\xd5\'\xce\x1e\xe1\x97\x89\xa3b\x9f\xf6\x8c\xac3:0\t\xf3\xb3\x8c4\x80N\x84\xdf\x12\x05\x00?S>}\xce9\x88C') 20:03:57 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x33, @dev={0xac, 0x14, 0x14, 0x4}, 0x4e24, 0x1, 'none\x00', 0x6, 0x9, 0x3e}, {@multicast1, 0x4e23, 0x4, 0xc5, 0xfffffffffffffff7, 0x1}}, 0x44) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x8000, 0x2, {0x3, 0x3, 0x800, 0x3, 0xd6}}) [ 345.161585] QAT: Invalid ioctl [ 345.165277] QAT: Invalid ioctl [ 345.170523] Error parsing options; rc = [-22] [ 345.200816] QAT: Invalid ioctl [ 345.214744] Error parsing options; rc = [-22] [ 345.223257] QAT: Invalid ioctl 20:03:57 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x715c, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000001c0)={0xb, @raw_data="1e7d5f39972bcaacc7e1beaa5ebde14c7483ddaeb34b90cbb3c7cd32d8309faadae65a329d19ad9ca87342213437a919e5046965b1d0d2565564d9d9dc14e535c3d88b3e61b587ac08c1378f2e3fe7839ee2ec22b97a3c4415d974425617a13c67ae257014dec25c52ac7c00cfcec7c8aa3d80835ded1c5ded49b940da3da1c52bb2221c54cf34754ff5587a7d52cb285e0e024c3824c86902770fcaae725f49b8445b832cab177712ac0bb4294e70cb47be73209026983bcaf99b6e949ea6c33414a221c96a2b6e"}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000002c0)=0x6, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000000c0)) accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) bind$can_raw(r1, &(0x7f0000000140)={0x1d, r2}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x43, 0x3, 0x3}, 0x10) 20:03:57 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:03:57 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e20, 0x5, @remote, 0x1}}, 0x7, 0x4}, 0x90) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r2, 0x300, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x10, 0x18, {0xf4, @bearer=@l2={'ib', 0x3a, 'gre0\x00'}}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "890454", "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"}}, 0x110) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x6, 0x7, [], &(0x7f00000000c0)=0x6}) 20:03:57 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') open$dir(&(0x7f0000000040)='./file0\x00', 0x600, 0x4) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) 20:03:57 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) [ 345.554069] Error parsing options; rc = [-22] [ 345.608994] Error parsing options; rc = [-22] [ 345.622718] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 345.631562] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 345.644067] Error parsing options; rc = [-22] [ 345.699549] QAT: Invalid ioctl [ 345.704913] QAT: Invalid ioctl [ 345.730452] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 20:03:57 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 345.739429] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 345.751946] Error parsing options; rc = [-22] [ 345.767179] QAT: Invalid ioctl [ 345.792936] QAT: Invalid ioctl 20:03:57 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x1, &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+30000}}, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0xfa0, 0x3, 0x4}) 20:03:58 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0xfffffffffffffff9) r1 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0xec, 0x0, &(0x7f0000000240)=[@register_looper, @increfs_done={0x40106308, r1}, @reply={0x40406301, {0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x78, 0x78, 0x0]}}, @transaction_sg={0x40486311, {{0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x38, &(0x7f00000000c0), &(0x7f0000000100)=[0x78, 0x30, 0x28, 0x78, 0x78, 0x58, 0x20]}, 0x3}}, @transaction={0x40406300, {0x2, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x58, 0x20, &(0x7f0000000180)=[@ptr={0x70742a85, 0x0, &(0x7f0000000140), 0x1, 0x0, 0x34}, @fd={0x66642a85, 0x0, r0, 0x0, 0x1}, @fd={0x66642a85, 0x0, r0, 0x0, 0x3}], &(0x7f0000000200)=[0x38, 0x38, 0x30, 0x38]}}], 0x1a, 0x0, &(0x7f0000000340)="195b647a13a907df62abb78f59b9dd29677d6b0c480aa917a252"}) [ 345.953234] Error parsing options; rc = [-22] 20:03:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8000, 0xfffffffffffffffd, 0x5}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0x40, @local, 0x40}}, 0x4, 0x3, 0xc7c8, 0x2, 0xb52e3b34e1a03238}, 0x98) 20:03:58 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 346.024600] Error parsing options; rc = [-22] [ 346.132832] QAT: Invalid ioctl [ 346.152097] QAT: Invalid ioctl 20:03:58 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 346.181352] QAT: Invalid ioctl [ 346.200473] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 346.209060] QAT: Invalid ioctl [ 346.209508] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 346.225065] Error parsing options; rc = [-22] [ 346.229781] QAT: Invalid ioctl 20:03:58 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) sendto$rxrpc(r0, &(0x7f0000000440)="bf92fafeecd54ed3ec5f69cde6bcddf6c67a8afd4679115d6a4983bad58c3631c3708b94895d26140028458d72c70044b19a6e307492b45c4ffee1a497627eca", 0x40, 0x40000, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 346.263763] QAT: Invalid ioctl [ 346.275690] Error parsing options; rc = [-22] [ 346.316269] Error parsing options; rc = [-22] [ 346.346694] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 346.355733] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 346.368290] Error parsing options; rc = [-22] 20:03:58 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x2000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:03:58 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x100001, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@fowner_gt={'fowner>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_gt={'uid>', r4}}, {@hash='hash'}, {@measure='measure'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}]}}) [ 346.659354] Error parsing options; rc = [-22] [ 346.672866] Error parsing options; rc = [-22] 20:03:59 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e20, 0x5, @remote, 0x1}}, 0x7, 0x4}, 0x90) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r2, 0x300, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x10, 0x18, {0xf4, @bearer=@l2={'ib', 0x3a, 'gre0\x00'}}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "890454", "82f5bb46d13049bc8d7c5af54b3c44423ff0dd637283499c06cad743c7e22d44b8b07fc5617ca0e8bfc2ce7d5957696b718b0e194da53bbffbb6e1b28faaaa6e7144b9b60c714d87278f6ef738c062fea5385c9cd3d494e3be9a88eff465d306ebbbe4f2e004804d42b4b003a152489480c10f11f89b16d53e84c0f8ac8c6f0200ed2c6cb824874ae14f5c9f50fd42d131d34efc4cb995488ac04bb069700c812991f65d21a4ef418f2972e4df4422ed637244a85820599751e5bdd1e8ae75eb32ad2dc831465f0561bc7c236e4552a4c73f646026c4de6be7306f3b51473458765c5c4542b8a7acc530aa4bff41a4b5b521858828dcc644f108a453e9c59c14"}}, 0x110) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x6, 0x7, [], &(0x7f00000000c0)=0x6}) 20:03:59 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)=0x4) 20:03:59 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:59 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:03:59 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x10000000000, 0x0) [ 347.034211] QAT: Invalid ioctl [ 347.044860] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 347.053912] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 347.066414] Error parsing options; rc = [-22] [ 347.085076] QAT: Invalid ioctl 20:03:59 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='\xec\xe2\x17!n\x86\xc1\x19\xfeC\x9e|\xb4Fo{d\x92\x06\xda\xbe\x8aH\x9e\xd1kz\xa8\x06<\x845\x15\xe8\xefcn\xe5IA\x82\xf4\x10\xd5U\xc7J\xa7OX@\xf6;\xcb,\xe8\x0fu\x1d-\v\xd7a\t\x9b##\x8f`\x94\xfa[\xeeY\x1fU\xfa\xa8&v\x9b\x96i\x95\xe5\xcf3j\xa4?\x91:8U\'==i\xe70C\x06\xc8j&\xf9wv\xe0\xef\x13\x02\x1c\xba\x16\xdc\xa09\xc6\xe1\xbd\xe7*\x93\xd0\xf83X\x85L\xfe\x15\x01\x98&\x80\a\x05on\xa0|\x15\xb1\xde\xfbk\x97\xd8\xdc6F\xffP#\x17*\x06\xba\xfdV;T\xad\x04\xeb\xb8H{\xf7\xa1\x12\xb9\f\x88\fc\xde:\x1d}\x04&>m\x96\x1f\xbd\xc7', 0x0, 0x0) 20:03:59 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) 20:03:59 executing program 3: creat(0x0, 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:03:59 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 347.325492] QAT: Invalid ioctl [ 347.374224] QAT: Invalid ioctl 20:03:59 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) 20:03:59 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'veth1_to_hsr\x00'}}, 0x1e) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000000)={0x4, 0x401, 0x3}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000100)={0x0, 0x1, @raw_data=[0x7fffffff, 0x9, 0x1000, 0x6, 0x0, 0x2, 0x1, 0xa58b, 0x3, 0x8, 0x407a, 0x462000000, 0x15, 0x5, 0x0, 0x100]}) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x9, 0x391b, 0xfffffffffffffeff, 0x3, 0x2, 0x5056, 0x10, 0x8}}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x3, 0x1}, 0x10) 20:03:59 executing program 3: creat(0x0, 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 347.587553] Error parsing options; rc = [-22] [ 347.620093] QAT: Invalid ioctl [ 347.629457] QAT: Invalid ioctl [ 347.636883] Error parsing options; rc = [-22] [ 347.655120] QAT: Invalid ioctl [ 347.661347] QAT: Invalid ioctl [ 347.688992] QAT: Invalid ioctl [ 347.710774] QAT: Invalid ioctl [ 347.740209] QAT: Invalid ioctl 20:03:59 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x4000000804, 0x9) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x4, 0xf500000000000000, 0x8}, 0x4}, 0x20, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3504000000a208dd8051f3dce7001800050008000100756470000c0002002500040000000000"], 0x2c}}, 0x0) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x80000) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) 20:03:59 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='udf\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:03:59 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) socket$isdn(0x22, 0x3, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 20:04:00 executing program 3: creat(0x0, 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:04:00 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x80800) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 347.986626] Error parsing options; rc = [-22] 20:04:00 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 348.026305] Error parsing options; rc = [-22] [ 348.150543] QAT: Invalid ioctl 20:04:00 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xe, &(0x7f0000000200)="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", 0x1000) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000040)=0x44f, 0x1) 20:04:00 executing program 2: fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v1={0x1000000, [{0x1, 0x1}]}, 0xa, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8c2, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000100)={0x0, {0x1, 0x7}}) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000240)={0x8c, 0x40, &(0x7f0000000140)="cfa7b0a3310ecff62afd9f5d48d616055458efdf651f03417fa2f847f7f40613a5ac5f316b2d55c95c2072acf991d465528dc36922495958fc6908ce7a0d463f8056458df3c68a7c7c56d9f10ba8f42853b62664215064edacdde18a844cdecc74bb3068fe1c4a17a4293324d3f76de83a125098ae8d1c9f33a9147b032d3f85627e800b0ce8fca0aa469342939ef9faf17c7c4281d415257c7699e523b864a58f865da5a81111097fa9b91f0eb5c02573fff60e66db7340a57f24b3f6848010863a343a3635c06c56", {0x7, 0x1, 0x384c4150, 0x0, 0x1, 0x8001, 0x1, 0x1}}) [ 348.215600] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 348.224578] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 348.237152] Error parsing options; rc = [-22] 20:04:00 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:04:00 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x340, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x24, 0x4, 0x5}, 0x81}}, 0x18) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x0, r0}) [ 348.523050] QAT: Invalid ioctl 20:04:00 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:00 executing program 4: rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x8001, 0x4}, 0x1}, 0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x40}, 0x3}}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 348.543245] QAT: Invalid ioctl [ 348.559201] QAT: Invalid ioctl [ 348.623115] QAT: Invalid ioctl [ 348.626376] QAT: Invalid ioctl 20:04:00 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) 20:04:00 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, 0x0) [ 348.668691] QAT: Invalid ioctl [ 348.744551] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 348.753546] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 348.766087] Error parsing options; rc = [-22] 20:04:00 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x10100, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000180)={0xff, 0xffff, r1, 0x0, r2, 0x0, 0x4, 0x81}) [ 348.821897] Error parsing options; rc = [-22] [ 348.864901] Error parsing options; rc = [-22] 20:04:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="f7db1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000ff710adcff000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x41100, 0xfffffffffffffffc}, 0x48) [ 348.960739] QAT: Invalid ioctl [ 348.982922] QAT: Invalid ioctl [ 349.000509] QAT: Invalid ioctl [ 349.015428] QAT: Invalid ioctl 20:04:01 executing program 1: setxattr$security_smack_entry(&(0x7f0000000040)='\x00', &(0x7f0000000300)='security.SMACiMh\xf0J|\v2\xd09\xc5D\xb6I\xf7\x82u\x99\xd8\x9b\xae\x1ex\x8b\b/}', &(0x7f0000000200)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl', 0xef, 0x1f3c05564c58f0f0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r1, 0x8000}, &(0x7f0000000180)=0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:01 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 349.030424] QAT: Invalid ioctl [ 349.044072] QAT: Invalid ioctl 20:04:01 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = shmget(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f00000000c0)=""/142) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:01 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/174, 0xae) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0x1000}, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c2000000000000000000080045000013000100000000907800000000ffffffff0000000000289078"], &(0x7f0000000380)) [ 349.150868] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.159894] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.172412] Error parsing options; rc = [-22] [ 349.241221] Error parsing options; rc = [-22] [ 349.271035] Error parsing options; rc = [-22] [ 349.282779] protocol 88fb is buggy, dev hsr_slave_0 [ 349.288553] protocol 88fb is buggy, dev hsr_slave_1 20:04:01 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:04:01 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x2, 0x0) [ 349.327172] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.336133] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.348627] Error parsing options; rc = [-22] 20:04:01 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x3, 0x0, "b0c7b9bd822173f59c1e3718ab4c8f332688edb9679d731b968df40b5242fe96389377f38336bf4c671230bda278ae03f4d218e21f6ba0537dae68dffb0e1863df5ec693e3dcd7a4bd19fdc267405a5a"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ccccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b00"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "521353f37dcd64c12799efb9dbad200b6cf433289feda8725ba79dbc3fd16f9663b3470bd7b9d07abd8ae0918551393a71edeebad46b9901f986110e8f2373000000c14f2ea21c5df84de8a85d8c9cfd"}, 0xd8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000740)={0x1ff, {{0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}}, {{0xa, 0x4e22, 0x10001, @local, 0xffffffff}}}, 0x108) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000640)={0x4c, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00634040010000000000000002000000000000000000000011000000000000000000000068000000000000004800000000000000", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000001000000000000001100000000000000852a747001000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0100050000000000000000001100000000000000852a64660000000008e166bdcce62497791a21b66097fb3950d97059be1550ccee716d72316a3da900000000", @ANYRES32=r0, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000038000000000000001800000000000000380000000000000000000000000000002800000000000000580000000000000030000000000000004000000000000000"], @ANYBLOB="0663044004000000"], 0xea, 0x0, &(0x7f0000000540)="39b2e0b79ee27c08ea4c7478b2c74735317d7e8d5e64e5adf256532eb900d4313e3e9c5ca6c389fc72d0cf0aaf273c5b2b30c719fb1f8888f3b18e270b094144c867c7f5df20cbd33f7c9d7c9809b68072bc954f0365751aded53dad3c592a01c8371d8e06c2f0973a0e856ecbd20eea0e68046568b69c6e070a51a46777e175acebfeef884c6763e94f5243e69101bead92deb47087d2edadfe08d158eeb9e61ddd4c84cb0d8953200bf0e37d848f04061504c58a9bc530d5a0288f1358005cd307064b67c4bcbd3eae4eee6e7cefec70492e8c71592035c60d15f23caf75bd240a8e95ce2744516b57"}) 20:04:01 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) [ 349.553152] QAT: Invalid ioctl 20:04:01 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) [ 349.696494] Error parsing options; rc = [-22] 20:04:01 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x7}}, 0x9, 0x6, 0x4, 0x0, 0x22}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x1}, &(0x7f0000000140)=0x8) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000180)={{0x0, @addr=0x10000}, 0x8, 0x2, 0x80}) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:04:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x505101, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xff, 0xa52, 0x5, 0x6, 0x3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x8005, 0x2, 0x7, r4}, &(0x7f0000000180)=0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a80)={&(0x7f0000003240)={0x14, r1, 0x225, 0x0, 0x0, {0x300}}, 0x14}}, 0x0) [ 349.760365] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 349.769391] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 349.781889] Error parsing options; rc = [-22] 20:04:01 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = getpid() r2 = getpid() kcmp(r1, r2, 0x5, r0, r0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:02 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0) [ 349.988180] QAT: Invalid ioctl [ 350.010761] QAT: Invalid ioctl 20:04:02 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x4) getsockname(r0, &(0x7f0000000280)=@generic, &(0x7f0000000000)=0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='afs\x00', 0x108, &(0x7f0000000300)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4\x01\x80\x00\x00\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8bQx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x01P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl\xce\xa0\xd1U\x93A\xb9C%\x99\xad\xc5\xa4\xd6\x0f%hH>\xc3\xd0V\t18j(\x97\xd1\x01bU\x90i\x86\x99T\xac(9\xff}0\xb7Q\x8b\xe2\x00>}\xf9\xe2\xe8*\xc9TI_\x18\xe70xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0fb1"]) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x171) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$KVM_RUN(r5, 0xae80, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mISDNtimer\x00', 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x4c0802) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) unshare(0x400) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x2, 0x9, 0x6}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 20:04:02 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:02 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x8000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="90000000d5f05ab07b66db68b9433d2dc33292ae11db39f307019cbdf0653f5d7a8d3fb45e1053ae4c8d392ab743d54f26a0ff92f68668cd0b5fede4118973dc8522e112465c0d90fc41f34c5f6e641c21a418e6521462da6c9ea9590bd312dbe44baec5fd628dafc280e058d9fe83ad111e188f454615585a8c3f75c656db6cc861537de6ebf22eafb07d2bcde8b8ceef83fd1909500bc6eed5b7d3b5a8fe9aeb8d09c3b887ff348109632385b7fc64904f8bbd8d7e979de7f98b6781a2164de3c9e3fc2cd689fef91555d025850c9411054b909d588b85e4f3b9e2f4c4e98b59036cba"], &(0x7f0000000180)=0x98) 20:04:02 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 350.671261] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 350.780825] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 350.790265] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 350.803337] Error parsing options; rc = [-22] 20:04:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x20008001, 0xfff, 0x3, 0x0, 0xffffffffffffffff, 0x6}, 0x11) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x22000, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffff9c, 0x8008563f, &(0x7f0000000080)=0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000100)) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000000c0)=r1) [ 350.866540] QAT: Invalid ioctl [ 350.874410] QAT: Invalid ioctl [ 350.893105] QAT: Invalid ioctl [ 350.912306] QAT: Invalid ioctl 20:04:03 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000180)={0x74, 0x0, [0x4, 0x401, 0x8, 0x3]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x6, 0x2, 0x1, 0x0, 0x7, 0x10000, 0x100, 0x81, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x8001, 0x8}, &(0x7f0000000140)=0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:03 executing program 3 (fault-call:1 fault-nth:0): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:03 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xd, 0x30, r0, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vxcan1\x00', {0x2, 0x4e22, @empty}}) [ 351.134670] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 351.143681] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 351.147625] Error parsing options; rc = [-22] [ 351.156184] Error parsing options; rc = [-22] 20:04:03 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='tmpfs.', 0x0, &(0x7f0000000280)) r0 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0xa4, 0x3) ioctl(r0, 0x8001, &(0x7f0000000100)="c5e4895a13a8d2525251a3171d38cddd431ea9618a0038e9535093d5fdce442e42eadbb11d4fb7fc30d903faf6d297390a87") [ 351.238954] FAULT_INJECTION: forcing a failure. [ 351.238954] name failslab, interval 1, probability 0, space 0, times 0 [ 351.250443] CPU: 0 PID: 11990 Comm: syz-executor.3 Not tainted 5.0.0+ #13 [ 351.257420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.266820] Call Trace: [ 351.269492] dump_stack+0x173/0x1d0 [ 351.273188] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 351.278439] should_fail+0xa19/0xb20 [ 351.282242] __should_failslab+0x278/0x2a0 [ 351.286545] should_failslab+0x29/0x70 [ 351.290499] __kmalloc_track_caller+0x1ce/0xc70 [ 351.295227] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 351.300486] ? ksys_mount+0xc4/0x3d0 [ 351.304256] ? strnlen_user+0x36d/0x490 [ 351.308295] strndup_user+0x154/0x300 [ 351.312153] ksys_mount+0xc4/0x3d0 [ 351.315764] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 351.321010] __se_sys_mount+0xe5/0x110 [ 351.324965] __x64_sys_mount+0x62/0x80 [ 351.328903] do_syscall_64+0xbc/0xf0 [ 351.332693] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 351.337918] RIP: 0033:0x458079 [ 351.341164] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.360127] RSP: 002b:00007fa59866bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 351.367884] RAX: ffffffffffffffda RBX: 00007fa59866bc90 RCX: 0000000000458079 [ 351.375187] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 351.382486] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 351.389788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa59866c6d4 [ 351.397088] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 [ 351.414252] QAT: Invalid ioctl [ 351.427096] QAT: Invalid ioctl [ 351.444546] QAT: Invalid ioctl [ 351.448757] Error parsing options; rc = [-22] [ 351.462637] QAT: Invalid ioctl [ 351.466070] QAT: Invalid ioctl [ 351.469483] QAT: Invalid ioctl 20:04:03 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:03 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="aa88aaaaaaaa0000000000000800450000700000000000019078ac2314bbac1414110302907800000000450000000000000000890000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x1}, 0xf) 20:04:03 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000380)) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="166b5f3901f2919130cc67c24851c71227f87150132e31262b14a4355abfacc9af4cae6e9ea45a57b8d12d3c87", 0x2d}], 0x302}, 0x4000810) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff9, 0x101000) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000180)=0x7) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000440)='mf\xac\xd6}E\x17t\xd9\x06\xc6\x0e\xban', 0x4, &(0x7f00000001c0)='%wlan0eth0\x00') ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000280)={0x7, @pix={0x8515, 0x1000, 0x7e77555b, 0x7, 0x2, 0x20, 0xb, 0x81a, 0x0, 0xf, 0x2, 0x6}}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_dccp_buf(r1, 0x21, 0xc0, &(0x7f0000000200)=""/19, &(0x7f0000000240)=0x13) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x98080) 20:04:03 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0xe19e, 0x1, 0x9, 0x80000001, 0x25, 0x3ff}, {0x4904, 0x181, 0x80000001, 0xcd, 0x0, 0x21b6}], [[], []]}) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 351.683371] Error parsing options; rc = [-22] 20:04:03 executing program 3 (fault-call:1 fault-nth:1): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 351.742863] QAT: Invalid ioctl [ 351.802984] QAT: Invalid ioctl [ 351.822354] QAT: Invalid ioctl [ 351.825790] QAT: Invalid ioctl 20:04:03 executing program 4: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000180)=""/132, &(0x7f00000000c0)=0x84) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000000), 0x1a0, &(0x7f0000000180)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 20:04:04 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000004c0)=0xfffffffffffffffa, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000080)={{0x7, 0x0, 0x8, 0x5, 'syz1\x00', 0x2}, 0x1, 0x20000000, 0x1, 0xffffffffffffffff, 0x6, 0x1f800, 'syz1\x00', &(0x7f0000000000)=['\x00', '/dev/qat_adf_ctl\x00', '/dev/sequencer\x00', '/dev/sequencer\x00', '/dev/sequencer\x00', '/dev/qat_adf_ctl\x00'], 0x50, [], [0x1000, 0x400, 0x8, 0x5]}) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) [ 351.908774] FAULT_INJECTION: forcing a failure. [ 351.908774] name failslab, interval 1, probability 0, space 0, times 0 [ 351.920345] CPU: 0 PID: 12013 Comm: syz-executor.3 Not tainted 5.0.0+ #13 [ 351.927308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.936710] Call Trace: [ 351.939374] dump_stack+0x173/0x1d0 [ 351.943059] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 351.948309] should_fail+0xa19/0xb20 [ 351.952100] __should_failslab+0x278/0x2a0 [ 351.956410] should_failslab+0x29/0x70 [ 351.960361] kmem_cache_alloc+0xff/0xb60 [ 351.964488] ? getname_flags+0x12f/0xb10 [ 351.968624] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 351.973893] getname_flags+0x12f/0xb10 [ 351.977848] user_path_at_empty+0xbb/0x140 [ 351.982153] do_mount+0x2c1/0x65e0 [ 351.985763] ? copy_mount_options+0x4c/0x670 [ 351.990237] ? copy_mount_options+0x513/0x670 [ 351.994806] ksys_mount+0x32e/0x3d0 [ 351.998509] __se_sys_mount+0xe5/0x110 [ 352.002476] __x64_sys_mount+0x62/0x80 [ 352.006427] do_syscall_64+0xbc/0xf0 [ 352.010217] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.015452] RIP: 0033:0x458079 [ 352.018714] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.037685] RSP: 002b:00007fa59866bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.039998] QAT: Invalid ioctl [ 352.045446] RAX: ffffffffffffffda RBX: 00007fa59866bc90 RCX: 0000000000458079 20:04:04 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x8000, 0x0, 0xf3e, 0x3ffc000}, {0x1, 0x6, 0x8, 0x30}, {0x5d, 0x8, 0x5, 0x8}, {0x9a3a, 0x5, 0x80000000, 0x8}, {0xffffffffffffffb7, 0x3e, 0x2, 0x100}, {0x7, 0x5, 0x7, 0x6}, {0xfffffffffffff000, 0x0, 0xf52, 0x4}]}) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x4) [ 352.045472] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 352.045499] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 352.045526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa59866c6d4 [ 352.045551] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 20:04:04 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/88) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r0, 0xa, 0x1}, 0x10) ioctl$TUNSETLINK(r0, 0x400454cd, 0x334) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000001c0)={0x324, r1, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xd0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x51f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x59}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, '\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'batadv0\x00'}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x1, 0x6, @rand_addr="75d08197342a1901e08aa8beb3bb4efd", 0xfff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @loopback, 0x400000004000}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xcfd1, @mcast2, 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x10001}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}]}]}, 0x324}, 0x1, 0x0, 0x0, 0x44}, 0x20040004) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x80000, 0x0) socket$caif_stream(0x25, 0x1, 0x5) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x93ea) r3 = perf_event_open$cgroup(&(0x7f0000000600)={0x2, 0x70, 0xfffffffffffffff8, 0x0, 0x4, 0x100000001, 0x0, 0x9, 0x50008, 0x0, 0x100000000, 0x1, 0xffffffffffffff7f, 0xfffffffffffffff7, 0x5, 0xfff, 0x4, 0x78f, 0x1f, 0xd2b0, 0x100000000, 0x1, 0x1, 0xffffffffffffffab, 0x3c, 0xff, 0x80, 0x0, 0x7, 0x80000000000000, 0x2000, 0x486, 0x4, 0x9, 0xfffffffffffffffa, 0x1, 0x2, 0x6, 0x0, 0x8, 0x7, @perf_bp={&(0x7f00000005c0), 0x3}, 0x20000, 0x400, 0x20, 0x9, 0x4, 0xd3bb, 0x6}, r0, 0x3, 0xffffffffffffff9c, 0xe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) r5 = perf_event_open(&(0x7f0000000680)={0x2, 0x70, 0x4a94, 0x8, 0xfffffffffffffffd, 0x3, 0x0, 0xfffffffffffffff9, 0x10000, 0x1, 0x7f, 0x3, 0x0, 0x1, 0x7, 0x2, 0x304, 0x7, 0x4, 0x1, 0x10000, 0x7, 0x8, 0x9, 0x44, 0x8, 0x8, 0x1, 0x5, 0x9, 0x1, 0x81, 0x8, 0x6, 0x3ff, 0x2, 0x3e18fcea, 0x5, 0x0, 0x3, 0x3, @perf_config_ext={0x7, 0x6}, 0x0, 0x234, 0x583e77a7, 0x2, 0x3, 0x4, 0x2}, r4, 0xb, r0, 0xa) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000740)) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000780)={0xffff, 0x6, 0x8, 0xffffffff7fffffff, 0x2}) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x6685) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000007c0)=""/42) r6 = perf_event_open$cgroup(&(0x7f0000000840)={0x3, 0x70, 0xffff, 0x414, 0x5, 0x8, 0x0, 0x1f, 0x10000, 0x3, 0x6, 0x200, 0x2, 0xbba, 0xc6, 0x2, 0xa6f, 0x75d76949, 0x80000000, 0x4, 0x401, 0x1, 0x401, 0x101, 0x3, 0x0, 0x7fffffff, 0x80000000, 0x0, 0x7, 0x7, 0x6, 0x9, 0x6, 0x8, 0x1, 0x80000000, 0x1000, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f0000000800), 0x1}, 0x80, 0x9, 0x4, 0x0, 0x0, 0x315, 0x3}, r0, 0x8, r0, 0x4) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000018c0)={0x1000, &(0x7f00000008c0)="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"}) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000001a00)={&(0x7f0000001900), 0xc, &(0x7f00000019c0)={&(0x7f0000001940)={0x60, r1, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xea}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) modify_ldt$write(0x1, &(0x7f0000001a40)={0x1, 0x100000, 0xffffffffffffffff, 0x6, 0x5, 0xfffffffffffffffc, 0x101, 0x4800, 0x3bd3, 0x9}, 0x10) pwrite64(r3, &(0x7f0000001a80)="f955dcb814e139a3d345fd0ea58dc5f9f4a3617903d95c7efaec931aae3109bc6410637af5c420492efd889360fcceaa2a24a2a2bdee0fddd341020d7454d41b5c57825f10c068f0ac324fbac453104f25e37aa737d63b93c04e27f4692ce72abb2a012ff2193609ea9fe0e2844d46a7f0a0af16d88d1415c2560cc74e3b9e2c5b070ec9a4c940f1ca5cd42a926ca9055d4c88e69f4614e8c54fa6dcb2eee17de9513424f4394407712ed7d847ffdcfc6b480849741de5c3b85f7ace76692a9412e78b2e55c2d1ab9eb323571098d3c9d70dea", 0xd3, 0x25) connect$netlink(r0, &(0x7f0000001b80)=@proc={0x10, 0x0, 0x25dfdbfd, 0x40000002}, 0xc) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000001bc0), 0x4) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x1e) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001c40)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000001d40)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001c80)={0x78, r7, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x6, 0xffffffff, 0x2]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xcbc4}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="2d92174ed212240c60073fab92586d7c"}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x80000000, 0x0, 0x4, 0x80000000]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x40) r8 = semget(0x0, 0x7, 0x4) semctl$GETZCNT(r8, 0x3, 0xf, &(0x7f0000001d80)=""/101) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001e00)=""/4096) [ 352.223006] Error parsing options; rc = [-22] 20:04:04 executing program 4: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000180)=""/132, &(0x7f00000000c0)=0x84) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000000), 0x1a0, &(0x7f0000000180)}, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 352.260608] Error parsing options; rc = [-22] 20:04:04 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x8000, 0x5, 0x0, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="b9000000099c14954dce06d3431dd75900b6f5f35cf952445ce38254b51f3f877e08a81352a72b1ec07791fd6e3e2f23073d2a32ddbbf21dca6a64fd0e7f3deeb6455ccda31c6d5fda4af10f41c73cee9735df70e601942be730fed97d4a3116730700000000000000961a29a8a959ab1b9964038e529aef67193a85281777a7492598146eab872952c50b88162224c96030939e84674de78ddb6b00000016d7e02d59533c85f139575e0387a0f925a0879476cb4ba9e4368ec82ebddf"], &(0x7f0000000200)=0xc1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0x2, 0x2, 0x3, 0x8, 0x4, 0x1f, 0x0, {r2, @in6={{0xa, 0x4e23, 0x80000000, @loopback, 0x401}}, 0x80000000, 0x1f, 0x101, 0x3, 0xddcf}}, &(0x7f0000000300)=0xb0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='openpromfs\x00\xec\xdb\xd1r\x8c\x85FE\xfc2\xc2LkO\x80\xf8w?\x04\x9a\xcb\a$6\xcb#S\xdd\xc5d\xbf \x84r\xb3\xa2\x02Mm\xe7\x9b\xdc\\\xabik\x9a\xa7\xfa\xb7\x9e~\x8a\xedV\x8bu\xcc\xef\x13\x92\x19A\x063\xb1\xb5\xd7\xe3\x1a\x83\xa5)>\xbe7\xcd\'\xba\xaa\x94\xceO\n&\x8b\xf5@\x9d\xd2\x1e\x81\xa6S\t\xa14\xd2)\xeb\xe9F', 0x3, 0x0) openat(r0, &(0x7f00000003c0)='./file0\x00', 0x0, 0xc) 20:04:04 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10010000000003) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') tee(r0, r0, 0x6, 0x1) 20:04:04 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e22, 0x3, @rand_addr="b7c12aae55e11cbc8a88c5abd514f84d", 0x401}, r1}}, 0x38) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000100)=""/208, &(0x7f0000000200)=0xd0) 20:04:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x4200000002, 0x70, 0x4, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x6, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) [ 352.580544] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 352.589634] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 352.602116] Error parsing options; rc = [-22] 20:04:04 executing program 3 (fault-call:1 fault-nth:2): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 352.638064] QAT: Invalid ioctl [ 352.653182] QAT: Invalid ioctl [ 352.677430] QAT: Invalid ioctl [ 352.695412] QAT: Invalid ioctl [ 352.750572] FAULT_INJECTION: forcing a failure. [ 352.750572] name failslab, interval 1, probability 0, space 0, times 0 [ 352.762137] CPU: 0 PID: 12055 Comm: syz-executor.3 Not tainted 5.0.0+ #13 [ 352.769106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.778504] Call Trace: [ 352.781175] dump_stack+0x173/0x1d0 [ 352.785241] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 352.790488] should_fail+0xa19/0xb20 [ 352.794284] __should_failslab+0x278/0x2a0 20:04:04 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2800, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="9e0000003ec6fb887213dfa88ae9d87e731acc8a3cf041efff101aad36aed4d070fe653abf0a64bfa475d26bf5789cc2f1542349d157af54338da02cccefde8864c15bf7ff7aa22e2a62f5a4898c019ae3ea0e72f20025e43fb4b2fccdea1f2cc229e983fbdb9cd6a28b3d3c4f371222c749f1d6f8e2dd6f66abb812b87b1c45b30c010700afa4bd8e7667436b19b85f8c66a732270bb732126bb0438604eaff64a33a56347fb700292c5f52005ce7696a6bf56ad99bb5f682a4302af0684d334ad6c969dea5d2676f0000000000000000000000000000"], &(0x7f00000001c0)=0xa6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1}, &(0x7f0000000340)=0x8) write$eventfd(r0, &(0x7f0000000380)=0x6, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @aes256}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x7fffffeff7fffffe, 0x0) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000040)) ioctl$PPPIOCATTACH(r2, 0x4004743d, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000100)={0x9000000e}) [ 352.798592] should_failslab+0x29/0x70 [ 352.802542] kmem_cache_alloc+0xff/0xb60 [ 352.806676] ? alloc_vfsmnt+0x73/0xb10 [ 352.810642] alloc_vfsmnt+0x73/0xb10 [ 352.814437] vfs_kern_mount+0xaf/0x8c0 [ 352.818412] do_mount+0x1137/0x65e0 [ 352.822102] ? copy_mount_options+0x41/0x670 [ 352.826594] ksys_mount+0x32e/0x3d0 [ 352.830295] __se_sys_mount+0xe5/0x110 [ 352.834259] __x64_sys_mount+0x62/0x80 [ 352.838211] do_syscall_64+0xbc/0xf0 [ 352.842013] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.847253] RIP: 0033:0x458079 [ 352.850502] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.869479] RSP: 002b:00007fa59866bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.877247] RAX: ffffffffffffffda RBX: 00007fa59866bc90 RCX: 0000000000458079 [ 352.884557] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 352.891871] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:04:04 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x0, 0x0) [ 352.899184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa59866c6d4 [ 352.906499] R13: 00000000004c3d97 R14: 00000000004d6fa0 R15: 0000000000000004 [ 352.934541] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 352.943619] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 352.956118] Error parsing options; rc = [-22] [ 352.971201] Error parsing options; rc = [-22] 20:04:05 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000280)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='Dtrfs.', 0x6, 0x2) write$input_event(r0, &(0x7f0000000180)={{0x77359400}, 0x1, 0x5ee, 0x4}, 0x18) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r1, 0x8000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x7f, @dev={0xfe, 0x80, [], 0x22}, 0x5}}, 0x3, 0xed4f, 0x32, 0x5, 0x4}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0xff}, &(0x7f00000001c0)=0x8) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000040)=0xa5, 0x4) 20:04:05 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 353.134453] Error parsing options; rc = [-22] [ 353.168994] Error parsing options; rc = [-22] 20:04:05 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) pkey_alloc(0x0, 0x3) [ 353.228085] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 353.236987] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 353.249467] Error parsing options; rc = [-22] [ 353.325391] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 353.334421] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 353.346905] Error parsing options; rc = [-22] [ 353.381901] QAT: Invalid ioctl [ 353.395841] QAT: Invalid ioctl [ 353.633460] IPVS: ftp: loaded support on port[0] = 21 [ 353.732959] chnl_net:caif_netlink_parms(): no params data found [ 353.779682] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.786185] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.794161] device bridge_slave_0 entered promiscuous mode [ 353.802337] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.808792] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.816931] device bridge_slave_1 entered promiscuous mode [ 353.840326] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 353.851832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 353.876386] team0: Port device team_slave_0 added [ 353.884962] team0: Port device team_slave_1 added [ 353.944886] device hsr_slave_0 entered promiscuous mode [ 354.012274] device hsr_slave_1 entered promiscuous mode [ 354.066168] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.072667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.079513] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.086106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.141884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.157246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.166445] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.174891] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.184836] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 354.199881] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.212723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.220840] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.227412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.243137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.251277] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.257929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.295864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.304980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.313599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.325371] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.338851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.353069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 354.385056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.460408] Unknown ioctl -2146413349 [ 354.466314] Unknown ioctl -2146929151 [ 354.470814] Unknown ioctl 1074025677 [ 354.478224] Unknown ioctl 43785 [ 354.484176] Unknown ioctl 21519 [ 354.487956] Unknown ioctl 21532 [ 354.492497] Unknown ioctl -2147199696 [ 354.496680] Unknown ioctl 1074816016 [ 354.501998] Unknown ioctl 1074025835 20:04:06 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r1}) 20:04:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="8ba7ac1d3808c296997d0cd3ad3b8ba6b42d5a872cb7409038e9fad254ef77546690d81343eb93adde85138e", 0x2c}], 0x1}, 0x0) 20:04:06 executing program 3 (fault-call:1 fault-nth:3): creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:06 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) getpgid(r0) io_setup(0x5, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, &(0x7f0000000100)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[0x10001, 0x63aa, 0x5ccfe1c8, 0xffffffff, 0x800, 0x0, 0x7fffffff, 0x1f, 0x3, 0xe6, 0x6, 0x0, 0xfffffffffffffffe, 0x10001, 0xfffffffffffffffb, 0x3], 0x1000, 0x201010}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r3, 0x4004743d, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) 20:04:06 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000002c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 20:04:06 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x8001005, 0x7, 0x2}) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 354.507666] Unknown ioctl -2143271656 [ 354.512342] Unknown ioctl -2146413349 [ 354.516329] Unknown ioctl -2146929151 [ 354.520459] Unknown ioctl 1074025677 [ 354.526933] Unknown ioctl 43785 [ 354.528642] Unknown ioctl 21519 [ 354.530551] Unknown ioctl 21532 [ 354.538479] Unknown ioctl -2147199696 [ 354.543212] Unknown ioctl 1074816016 [ 354.548130] Unknown ioctl 1074025835 [ 354.623157] QAT: Invalid ioctl [ 354.652656] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 354.661493] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 354.674033] Error parsing options; rc = [-22] [ 354.693933] Error parsing options; rc = [-22] [ 354.696201] QAT: Invalid ioctl 20:04:06 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x208000) fallocate(r0, 0x10, 0x401, 0x7f) creat(&(0x7f0000000000)='./file0\x00', 0x0) read(r0, &(0x7f0000000240)=""/4096, 0x1000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 354.745033] Error parsing options; rc = [-22] 20:04:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x6, 0x98, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="5c59aebe7519", 0x0, 0x8000, 0x2, 0xffffffffffffffff, 0x0}) [ 354.818312] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 354.827276] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 354.839816] Error parsing options; rc = [-22] 20:04:06 executing program 0: ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) getdents64(r0, &(0x7f0000000100)=""/41, 0x29) 20:04:06 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x8000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1f) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@hci, 0x67) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="634883a67f0554b26737764aa2bc9e94"}}}, 0x80, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1210}, 0x0) 20:04:07 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x6000, 0x1) r0 = creat(&(0x7f0000000380)='./file0/file0\x00', 0x80000000000000) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x6f, 0x2, 0x6, "58a78d18dc638b04fff9edbb51380d5c", "84b32c79c3d5bb1bb6b5d9ff7dc4fc57cb28df04661a242f604458885a2922ee180e568d7c43755bbd40129730e04653400cd2ff3fc3144b38a7a7a009913de34c39335934195c3ba534bcf8b45b058b97a425ede90e3c11d9f4"}, 0x6f, 0x2) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000004c0)="9e092b5baffb2887a3bdd0e884dc17ab37dde5ef3250ee7831f98e0f6484384f964d5b16d5d4c4ad99c288d098876d44f1aab082dda79e98692742726413197f556980b9ad31d8dca3b465305922dcbdaa2d9165b1c7bb38ce703d89e8e2068692ec212b8a226282d701618ce19d2d215d2ecde399af32c52c11f55f6c19cbd91435a6268ebed6d04c7e335b511064c524b29cd9b4430aad39a5506101918a991d6fb77feda9de495471f51001946735d8f12756d9fb74b3ebbea495b8576cddfb80224243c60b362c3e7c4018e2b5f014998c7705c05a04725e5d9dd50382fa06b179eef34d7a879f2387", 0xeb) uselib(&(0x7f0000000000)='./file0\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000480)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x90, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x3, @rand_addr="ca7fb25cdea47f742d3355baccff54b6", 0x327}, @in6={0xa, 0x4e20, 0xfff, @dev={0xfe, 0x80, [], 0x14}}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x3, @loopback, 0x3f}, @in6={0xa, 0x4e22, 0x8001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7f}, @in={0x2, 0x4e21, @remote}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x5, 0x267e, 0x0, 0x401, 0x7, 0x1, 0x1fc, 0x7b0f, r2}, 0x20) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x19du\xc9\xfa\xcd\xfe\xd2\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9e\x0e\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:07 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x1d0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 355.178768] Error parsing options; rc = [-22] 20:04:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x6, 0x98, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="5c59aebe7519", 0x0, 0x8000, 0x2, 0xffffffffffffffff, 0x0}) 20:04:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) 20:04:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) r1 = add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="c02017255cc095d96a56c7debf562c1ee00922deaaa5b7dbbf16c190b645a89d3fbcb7bc297d2422232cd30d7b6ad0d74e2d2f7403950ae69f0db8", 0x3b, 0xfffffffffffffff8) keyctl$setperm(0x5, r1, 0x4000000) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000000)) [ 355.302680] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 355.311518] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 355.324278] Error parsing options; rc = [-22] 20:04:07 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x7) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000300)={0x4a, 0x6f, 0x1, {0x5, [{0x41, 0x1, 0x4}, {0x5, 0x1, 0x6}, {0x22, 0x3, 0x5}, {0x40, 0x1, 0x8}, {0x20, 0x3, 0x6}]}}, 0x4a) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz0', "de3cb67cbb14250a2f9bcb896989deb78e9fa7fcd1f126a351db6b6137eda557aa28409ed63f7a518ac5e520c527a3f7e31dbe41912b77227f9ac5dd0f88fd6ead8349e6e9fa4f52e6447a9fb403a88a4c388a4eb3865352fe1ce291d5d23479c8d71b48ba7d008f71f6e2d9dd31d4480e2b11530162d1e262fc53f5a68a1873b07936a881ebd7b84451eb0c8b5bc424d95d9388c8fac54cc4ebed196fce63d14e5574c61bba3bb65219a9340d8273fd46c578fdaafbd0b1f5e33dd9da0aadc5684aeef1b06829f7b7d01536a20d3b1ea7521036252b389150ef12b46f1d3fa47f842fbf8e141377d48146"}, 0xef) 20:04:07 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/147, 0x93, 0x40000023, &(0x7f0000000040)={0x2, 0x4e24, @broadcast}, 0x10) [ 355.517218] QAT: Invalid ioctl [ 355.555802] QAT: Invalid ioctl [ 355.581348] QAT: Invalid ioctl [ 355.595830] QAT: Invalid ioctl 20:04:07 executing program 1: semget(0x1, 0x3, 0x1c2) creat(&(0x7f0000000100)='./file0\x00', 0x20000000000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 355.633243] Error parsing options; rc = [-22] [ 355.664257] Error parsing options; rc = [-22] 20:04:07 executing program 4: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:07 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000180)={0x0, 0x0, @ioapic}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x0, r2, 0x16, r1}, 0x10) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000e00000004000000a00300000000000038010000380100000000000038010000080300000803000008030000080300000803000004000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010013801000000000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000000b0302010000000050006f736600000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000031090000080000000000000002000000280052454a4543540000000000000000000000000000000000000000000000000d00000000000000000038e8ac1414bbffffffffffffffff62617461647630000000000000000000626f6e645f736c6176655f3100000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000760003400000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280074746c0000000000000000000000000000000000000000000000000000000301000000000000280052454a4543540000000000000000000000000000000000000000000000000600000000000000ac1e000100000000ffffffffffffffff626174616476300000000000000000006e657464657673696d30000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d0001080000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000000f1000000000000280052454a4543540000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x400) 20:04:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fff8, 0x0, 0x820004, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x2c) 20:04:07 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="900000001e00000028bd7000fcdbdf2500000000000000000000000000000000000004d602000000ff02000000000000000000000000000105000000053500002c001300000000000000000000000000000000000000000000000000000000000a000000080003000203000014000d008fa83708c957ce22cde00000020000000000000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x4000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:08 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000200)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f0000000300)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f0000000080)='\x00', &(0x7f0000000400)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02'], &(0x7f0000000ac0)=[&(0x7f0000000540)=',self\\ppp0\x00', &(0x7f0000000580)='proc%ppp0eth0proceth0\\eth0\x00', &(0x7f00000005c0)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f00000006c0)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f0000000b00)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f00000008c0)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', &(0x7f00000009c0)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02']) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 355.870003] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 355.879013] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 355.891486] Error parsing options; rc = [-22] 20:04:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) sendmmsg(r0, &(0x7f000000dac0)=[{{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000005f00)="4ce7fe08da", 0x5}], 0x1}}], 0x1, 0x0) [ 355.974313] QAT: Invalid ioctl [ 356.000300] Error parsing options; rc = [-22] [ 356.005762] QAT: Invalid ioctl [ 356.040636] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 356.049737] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 356.062319] Error parsing options; rc = [-22] 20:04:08 executing program 0: r0 = socket(0x11, 0x6, 0x3) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x4, {0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffe}}}, 0x32) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1e) ioctl$PPPIOCATTACH(r2, 0x4004743d, 0x0) [ 356.088603] Error parsing options; rc = [-22] 20:04:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)) [ 356.243763] QAT: Invalid ioctl 20:04:08 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x4000000000008000, 0x0) [ 356.272279] QAT: Invalid ioctl 20:04:08 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c4c3454a8232730000fec4225d0a7700660f388204f666ba200066b8050066ef0f015a91b9800000c00f3235000800000f30c4c289beaa060000002e660fd47653660f3226440f01cf", 0x49}], 0x1, 0x61, &(0x7f0000000180), 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000200)=0x24) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000180)={0x1, 0x0, [0x7, 0x8, 0x7, 0x6, 0x401, 0x80000000, 0x16fd, 0x5]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:08 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$kcm(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="728797417a5c06a1abd1d137a04bb5a1d3720c201588a5cc6047bad4573296748a35db0b295ce636f0606f3cd1a2f0b6f2e6190f7ab045760bedab316f2f8bde645c1180055e621d20b4a7f0ff2d09a06e6437b73b74dff564ae70415d136ee0bc6ac758d7a846995c1f8a1d5e9ead744dbfce50cf3ab8e7d1d2e9686c2a41bdcd3cf1e245bc8db25805785de5e7a4012facaeeef2ea42f85e3416b25f8a7a7698b4b80c74ae85381934a56ace2c5218da64a60b63897f143e63dabe53977c", 0xbf}], 0x1, &(0x7f0000000180)=[{0x28, 0x109, 0x7, "56b1ac33992549d44bbaf76b64cb20839449114cce5ea7"}, {0x1010, 0x11f, 0x2, "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"}], 0x1038}, 0x40080) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 356.301049] QAT: Invalid ioctl 20:04:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000000000040bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00000000b706000000006e442d6403000000000045040400000000001c04000000000000b7050000000700007b1a00fe00000000850000002e000000b7000000000000009500000000000000"], 0x0}, 0x48) [ 356.490564] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 356.499504] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 356.512084] Error parsing options; rc = [-22] 20:04:08 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:04:08 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x1, "e348d5b808ab6b4939da8eaecb2076dabf6a7d93327d49dd041386f2bfcc3ea1", 0x2, 0x1}) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000200), &(0x7f0000000240)=0x4) connect$unix(r0, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) setsockopt$inet_buf(r1, 0x0, 0x3f, &(0x7f0000000340)="320ce6f6be3153d62ed6f7ebbdc81993ae9d70a6a1ed765788ff67892fce4033e32f8292b41a21d823f3d98f4ba668beaca3ac3821dab111253fb20272917a43459fe4920a03b830de5b0e034a9fdeb218fa631042d325eba5577069809a5d8d934fbde3d4893a079bd4c3", 0x6b) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\xc0\x02\a\xb5\x18\xdc\xcc`\xd2\x034\xd1=Hq]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\x95\xf4\xdei60\xcc', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x9, 0x400}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r3, 0x5}, 0x8) [ 356.596175] Error parsing options; rc = [-22] [ 356.635456] Error parsing options; rc = [-22] 20:04:08 executing program 4: semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(0x0, 0x0) r2 = dup3(r1, r0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) write$P9_RWRITE(r2, 0x0, 0xfffffffffffffdc3) 20:04:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x7}, {0x1, 0x0, 0x0, 0x1ff}]}) [ 356.792726] QAT: Invalid ioctl 20:04:08 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') mq_unlink(&(0x7f0000000040)='\x00') 20:04:09 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) restart_syscall() mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x800000, &(0x7f0000000500)='\\\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r1, 0x3}}, 0x18) 20:04:09 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="64038000", @ANYRES16=r1, @ANYBLOB="100029bd7000ffdbdf25040000001400070008000200ffffff7f080001000200000000010500340002000800030004000000080004000003782a08000400000000000800010006000000080002000100010008000200d70f00000c00020008000300090000000800010065746800080001006962000034000200080003000600000008000200e1000000080001000000000008000300d400000008000200040000000800030002000000340002000800020005000000080001000400000008000300050000000800010004000000080002000900000008000100030000000800010069620000340002000800040001000000080002008f00000008000200050000000800040004000000080002000500000008000100040000000800010069620000380004001400010062726f6164636173742d6c696e6b00000c00070008000300000000001400010062726f6164636173742d6c696e6b000014000200080001000000000008000100ff070000300002000400040004000400080002000600000004000400040004000400040008000200380b00000800010005000000040101003c00020008000300ff0f0000080003007c0b000008000200ff000000080001000100000008000200020000000800010000000000080003003f00000008000300010000001c000200080004000100000008000200ffffffff080003000000000008000300ffffff7f44000400200001000a004e2100000003fe88000000000000000000000000000109000000200002000a004e22fffffeff0000000000000000000000000000000003000000100001007564703a73797a300000000044000400200001000a004e2400000f56000000000000000000000000000000001f000000200002000a004e2300010000ff02000000000000000000000000000101000000480001002c0004001400010002004e210000000000000000000000001400020002004e21ac1e0101000000000000000008000300ba000000100001007564703a73797a30000000003c000100380004001400010002004e21ac1e00010000000000000000200002000a004e230000069593cbc607fb62fd0f36dab3d8bb80c7e300010000380001002c0004001400010002004e20ac1414bb00000000000000001400020002004e24ac1414bb00000000000000000800030007000000"], 0x364}, 0x1, 0x0, 0x0, 0x40880}, 0x4) 20:04:09 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 357.025148] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 357.034441] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 357.047073] Error parsing options; rc = [-22] 20:04:09 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x200000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x5411, 0x0) [ 357.131569] QAT: Invalid ioctl [ 357.178388] QAT: Invalid ioctl [ 357.207352] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 357.216373] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 357.228941] Error parsing options; rc = [-22] 20:04:09 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bfs\x00', 0x0, 0x0) 20:04:09 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = socket$kcm(0x10, 0x40000000000002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000012008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfe3d, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002a00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(r0, 0x0, 0x4000804) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) recvmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x1a0, &(0x7f00000012c0), 0x0, 0x0, 0x4000000000000}, 0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001240)=""/192, 0xc0}, {&(0x7f0000000000)=""/39, 0x27}, {0x0}, {&(0x7f0000001980)=""/219, 0xdb}, {0x0}], 0x5, &(0x7f0000001c40)=""/205, 0xcd}, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={&(0x7f0000001700)=@nfc_llcp, 0x80, &(0x7f0000001900)=[{&(0x7f0000001780)=""/163, 0xa3}, {&(0x7f0000001840)=""/161, 0xa1}, {&(0x7f0000001080)=""/35, 0x23}, {&(0x7f0000001a80)=""/145, 0x91}, {&(0x7f0000001d40)=""/249, 0xf9}, {&(0x7f0000001e40)=""/184, 0xb8}], 0x6, &(0x7f0000001f00)=""/189, 0xbd}, 0x103) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40800) 20:04:09 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='dax\x00', 0x44000, 0x0) 20:04:09 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/166, 0xa6, &(0x7f00000000c0)=""/238, 0x3, 0x5}}, 0x68) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x7) 20:04:09 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x1f, 0x6]) 20:04:09 executing program 4: futex(0x0, 0x400000085, 0x0, 0x0, 0x0, 0x20000000) [ 357.497064] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.506296] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.585100] QAT: Invalid ioctl [ 357.623918] QAT: Invalid ioctl 20:04:09 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x9) setsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f00000000c0)="93ec3b893aacd6128beba087cd50aac65cb53eadfc3dd81ca8c81e04730a61b027df101ceca38d09894abe341aa7cb963488e71b229dec3d83d263dd9a82fd3efab7073ca44a55e95e4ecc1d86b6a2f385450fe508e967e418649c9fd953cfc67cb1c533549f62fbe2b0", 0x6a) bind$netlink(r0, &(0x7f0000000780)={0x10, 0x0, 0x25dfdbfe, 0x2002000}, 0xc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@security={'security\x00', 0xe, 0x4, 0x590, 0x230, 0x230, 0x118, 0x0, 0x0, 0x4c0, 0x4c0, 0x4c0, 0x4c0, 0x4c0, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x11, 0x3, 0x6}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x4, 0x1}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x66000000000, 0x2, 0x1}}}, {{@uncond, 0x0, 0x248, 0x290, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7ff, 0x8, 0xb8a39ba, 0x3f, 0x34, 0x1, [@local, @rand_addr="ab3ab452b1ff01c9911859de53649995", @rand_addr="c598de40b135b206ab92dd0915e2e56d", @dev={0xfe, 0x80, [], 0x1d}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @dev={0xfe, 0x80, [], 0x2b}, @rand_addr="80b32e836041c9a1933f4a4cfd135a6d", @loopback, @empty, @mcast2, @dev={0xfe, 0x80, [], 0x1f}, @empty, @loopback, @empty, @rand_addr="491289249b934b6f4a8f0a9e4c581e24"], 0x3}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x9, 0x7, 0x1, [0x3, 0x7, 0x5, 0xffffffffffffffff, 0x9, 0x7, 0x3, 0x2, 0x3, 0x0, 0xcb79, 0xfffffffffffffe01, 0x4, 0x7, 0x8000, 0xfffffffffffffff3], 0x5}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@rand_addr=0xc93e, 'veth1\x00', 0xcefc}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5f0) [ 357.647835] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 357.656863] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 357.661506] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.669484] Error parsing options; rc = [-22] 20:04:09 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000009c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a40)={'ip6tnl0\x00', 0x0}) getpeername$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000dc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d80)={&(0x7f0000000240)=ANY=[@ANYBLOB="a4010000", @ANYRES16=r1, @ANYBLOB="04072dbd7000fcdbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="80000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6], 0x1a4}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 357.772181] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 357.781085] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 357.793797] Error parsing options; rc = [-22] 20:04:09 executing program 4: r0 = socket$inet(0x10, 0x802, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2fa}}], 0xfe, 0x0, 0x0) 20:04:09 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x184) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2d, 'rdma'}, {0x2f, 'io'}, {0x2d, 'rdma'}, {0x0, 'pids'}, {0x2f, 'cpu'}]}, 0x20) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040)=0xf6d0, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x8}, {0x3f, 0x8}, 0x4, 0x0, 0x2}) [ 357.833088] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.839643] Error parsing options; rc = [-22] [ 357.860914] Error parsing options; rc = [-22] [ 357.887497] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.896570] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.961866] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.972325] QAT: Invalid ioctl [ 357.978268] QAT: Invalid ioctl 20:04:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x56400, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') fadvise64(r0, 0x0, 0x7, 0x4) [ 358.005740] QAT: Invalid ioctl 20:04:10 executing program 3: socket(0xa, 0x6, 0x259) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x2}, &(0x7f0000000340)=0xfffffedc) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r2, 0x7fffffff}, 0x8) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:10 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/88, 0x58) [ 358.084950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 358.119828] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 358.128907] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 358.141556] Error parsing options; rc = [-22] [ 358.180907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 358.227371] Error parsing options; rc = [-22] [ 358.240859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:04:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 20:04:10 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 358.280357] Error parsing options; rc = [-22] [ 358.314851] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 358.324460] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 358.337072] Error parsing options; rc = [-22] 20:04:10 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000040)) [ 358.403715] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 358.426647] QAT: Invalid ioctl [ 358.453601] QAT: Invalid ioctl 20:04:10 executing program 4: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='\b&\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) 20:04:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x878, 0x508, 0x0, 0x0, 0x508, 0x0, 0x7a8, 0x7a8, 0x7a8, 0x7a8, 0x7a8, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x5, 0x3, 0x20, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1c, @ipv6=@loopback, @ipv6=@local, @gre_key=0x5c, @gre_key=0x8}}}, {{@uncond, 0x0, 0x388, 0x3d0, 0x0, {}, [@common=@unspec=@bpf1={0x230, 'bpf\x00', 0x1, @pinned={0x1, 0x0, 0x0, './file0\x00', 0x7fffffff}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x3, 0xfffffffffffffffe, 0x6, 0x8001, @ipv4={[], [], @broadcast}, @mcast1, @empty, [0x0, 0xffffffff, 0xffffffff], [0xff, 0xff000000, 0xffffff00], [0xa9444b3913c1f19f, 0xffffffff, 0xffffff00, 0xff000000], 0x1412, 0x484}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x3, @ipv4=@rand_addr=0x58, @ipv4=@multicast2, @gre_key=0x6, @port=0x4e20}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x8, 0x7, 0x1, [0x8, 0x8, 0x4, 0x5e, 0x5, 0x9, 0x8, 0xa7d9, 0x5, 0x7, 0xc9e, 0x1073, 0x26dc000000000000, 0x100000000, 0x3, 0x80], 0x9}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x1, 0x18, 0x1}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x381e}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d4, 0x0, 0x9, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv6=@dev={0xfe, 0x80, [], 0xc}, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @gre_key=0x80000001, @icmp_id=0x65}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x8d8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x7ff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) 20:04:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x7, 0x40) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xfff, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f0000002400)="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", 0x1000, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x400100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") [ 358.697325] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 358.706354] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 358.718876] Error parsing options; rc = [-22] 20:04:10 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x82a00, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 358.864530] Error parsing options; rc = [-22] 20:04:10 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x7, 0xffffffff, 0x1f}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sync_file_range(r0, 0xf3, 0xa237, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) [ 358.923860] Error parsing options; rc = [-22] 20:04:11 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) restart_syscall() write(r1, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) 20:04:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x7fffffff, 0x30, 0x2, 0x8}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r1, 0x17, 0x5, [0x4, 0x6, 0xf7, 0xffffffffffffffbd, 0x9b]}, 0x12) [ 359.047317] QAT: Invalid ioctl [ 359.072140] QAT: Invalid ioctl 20:04:11 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) 20:04:11 executing program 2: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecr}pt\xbd\x9akOt8.A9\x85{fs\x00Y]N\x04\x04\xe2\xa2\x8a\b\xc6\xa9zG\x1e\xdf\xe7\xe1\xf9\t\x00h\xdc6w\xeb\x14\xd4\xf7\xeeM\xd9\xa6}\xea\xa7\xf4hT\xc9\xa7b\xaa\xa8b\x14U\xc6\x88\n\xb3H\n\x89\xb6\x01i\x80^D\"\xc1\xd1U,Umdg\xc6\xc5\x8a\xc8i\x83\xa7}\xfeS\xf0 r\xa8\xb6<\xddRh\xcdc\xecCu\xd1\xaej\xc5\x90\xe0\x88\bZ\x96\xde\xa0Q\x7f\x14\xae\xb9\x01+\x11\x8c\xde\xe4\xfe\xd5\x01TZ\a\xd1\'\xdc\xe1O33e\x1d\x84H\xf9Z\xa6\xd9by\xf7\xf4/L\xaa\xa4M#\x8d', 0x200000000000004, 0x0) getgid() ioctl$TIOCNOTTY(r0, 0x5422) 20:04:11 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 20:04:11 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix^acl_accesc\x00\xe9h\xbd\xb8\xf8\xb9\x16\xc0P\x01CT\xc1\xbf\v\x9a\x80Ip\'\xa4\xae\x9aq\xe1t\xf6\xa9\xe7\x1d\xfc\xb86r\x98R\xef\xf8+\x10_\xb3x\xfa]\xe1\xb5M\xc4>\xccI.\xc1U\x85\x8c\xab\b$\xbf\x14i\x15]h\x90\x1a\x9d\x96|]\'p\xbb\x9e\x18\x9f\xbb\xd7\x19\xdf\xe0C\xc4\xa4A\xdf\xfd\xd0n7\x8f\xae\xeb\xd3\xafSC\xf3\xd6\x0e\xfb\xe2\vJe2\xa9\x81L\v\x1f\xb5\xf8}\x04\x0e{`\xd2x\xd2\xb9r\xb4\xe4\x9a\xa2,X\xf9ig\x05\xb6\x0f\x89\xc6IM\xb6\xb7t\xbe\x8c\x01\xd5\xd3~+\xab9x^\xee\xf8\x01\xc8i\x9ae\x8b\x1a\xc7^\xa4\xa3\x8e\x9b\x81\xb92\x03\xca|\xb4\'\x14\xd6\xc0q\x804MEV\xf3\xd3\b1\x85\x1f\t\x8d\x84\xec', 0x0, 0x0, 0x0) [ 359.207634] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 359.216640] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 359.229113] Error parsing options; rc = [-22] 20:04:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=ANY=[@ANYBLOB="85000000070000004c000000000000009500140000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="c10e85f98ad0e679055e19f25b0d", 0x0, 0x1f36}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 20:04:11 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/59, 0x3b) 20:04:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x99, @remote, 0x4117}}, 0x1ff, 0x3, 0x401, 0xf7cc, 0x2}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={r1, @in={{0x2, 0x4e24, @local}}, [0xa45f, 0x0, 0x1000, 0x8, 0xffff, 0x10000, 0x2f, 0x41, 0x400040000000000, 0x10001, 0x100000001, 0x107b, 0x9, 0x7ff, 0xbe]}, &(0x7f0000000440)=0x100) pipe2(&(0x7f0000000040), 0x3fd820fdfac82cd) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:11 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x8001007, 0x0, 0x2}) 20:04:11 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 359.615594] QAT: Invalid ioctl [ 359.650126] QAT: Invalid ioctl [ 359.681505] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 359.690476] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 359.706076] Error parsing options; rc = [-22] 20:04:11 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0xa03, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000140)=0x2) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000180)) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x5, 0x3, 0x2, 0x8, 0x80, "1005a6d07d206a3faca93484eec3345230ca4c670ad42071ac7c72eace88f8a3784f1b641881fb7dd736282a972f4b17005c9bc1fad9c25a5f673d6f6880b5d189f4a34a0d3f8604a456178e9326f8096d9ccc94a764ff9ce40eb6747d6f75469cd48cd04fc8769b637bd277e433bff4f2ab7dbb96c3d1faa7ca7b62ad75a72a"}, 0x8a, 0x2) [ 359.821828] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 359.830654] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 359.843377] Error parsing options; rc = [-22] [ 359.850572] Error parsing options; rc = [-22] [ 359.877272] Error parsing options; rc = [-22] 20:04:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 20:04:12 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='vfat\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x6}}, 0x18) [ 359.923968] QAT: Invalid ioctl [ 359.939098] QAT: Invalid ioctl [ 359.975129] QAT: Invalid ioctl [ 360.006536] QAT: Invalid ioctl [ 360.028151] QAT: Invalid ioctl 20:04:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) readahead(r0, 0x1e49, 0x1) [ 360.048853] QAT: Invalid ioctl 20:04:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x7c, 0x40800, {"262e602697ec69f163685a0d68fb047873493ceb983d559a20bee33fd4d5cc83a4664686be1ea11163c2f2ae11d6a162ee3da210dc8bf7468c1ac5a6e95ca1bf189c9530dcb10cb152be16cba3d8a953ed98880620d62ac4be255427ff0755729a0598"}}, {0x0, "978e07403314fd6b095b98b754a9e1e589b983eb68df0c8e46d65a1c"}}, &(0x7f0000000040)=""/6, 0x9a, 0x6}, 0x20) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bind(r2, &(0x7f00000000c0)=@nl=@unspec, 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) [ 360.183233] Error parsing options; rc = [-22] [ 360.203743] Error parsing options; rc = [-22] 20:04:12 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) sendmsg$tipc(r0, &(0x7f0000000480)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x0, {0x4e23}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000000040)="6cda023650dcc4f16a012d480c76f44d421d5f24749a73babeec32d87cb086714d425f12b35b14bca3bf21a117a11b3ff218d7759a184fa3ecd6f98263ff69b8ac5742c72654cea137ab56a9ee3083ca84a435483133ab1d97fb633c154323f340a70815e6cbea4caf66cd7804f5e409075f25", 0x73}, {&(0x7f00000000c0)="6bfcb5e363453be2e5056ced86ebd8629e7818376ad9dd5eeb8dce04f596ac6d0ab1973a826bbf0e0845cf11db439021bc70a170a25729197877905d92ccdfec37959b96385b3cbdf7193de51765c0093067b074d2a74fa4e5dc75aadb8f338a4c6f15b2c65823077a5fc8bd341192e62d593728798cd7e6fb37", 0x7a}, {&(0x7f0000000140)="d282e0bd0e88087e33f7fd74df1a7ba28995103d549b979efa53d139dda096f637bc312c81d80bb9bc7c03cba049fee803aa1baf20adf1f83ddd6acbd2275065f65dc0b24da3bb6d2ae06fa9dac693c2c55b5df7fbaec964e615684b1cfed4cc6f336e2ec0506eb6ae1229b9136fc30cdd24816f372a885fb09808a6ca4e534ad8318a981c6ec96a945e3931bf2873f402007ebf12cb8c33d46a469ff31cdf33cf7f8c", 0xa3}, {&(0x7f0000000200)="3532a5f744d4807f903759f7120b760d1ca5a05a40851e0bb2981415636d4ed3e4380eac68b45dc5dd9c0a1b62f22bca7c41b9a29f7ad9ccc78694deb20bacbf3a7e14ef0b", 0x45}, {&(0x7f0000000280)="99cfcb6e4f5d87451e6684697370554aa5a2e825d60bfb701b33ef41307328e89821cfb130d3a1add3d30b488a326f6e2d317e5c8a66908cf0bce9c7baa3e0633c2b278f4e16", 0x46}], 0x6, &(0x7f0000000380)="6decdede8290996cb55201cd02b42b1272a4c50f4cb76d7cbfbc7ce57da0eb1316ab3da3be3a6d173972817cc7f3688bb07419dcb8f6010b1c4cf76098c27eb7c2250677fb30cfe88078983b2d245c61db601e7af30cad66fd3445473bdb8f6a82357a7824d7ffe88f1b4f22abe9c40f96d4d4ff4b4a5ea75a234d2d10b89bde20d67b0e5925b4d9698ca32fa2727059bbe47e33c5c614c77ee0ffaf1cb4a05d3c049071bbbcebfd6b84875fa80f2ec17c9b88a5e6c753b25ff77d2a23e32a145c72db99d6a43c2f7c387801f5c1c88a2693", 0xd2, 0x880}, 0x0) [ 360.250017] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 360.259143] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 360.271797] Error parsing options; rc = [-22] [ 360.329005] QAT: Invalid ioctl [ 360.334693] QAT: Invalid ioctl [ 360.371031] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 360.379970] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 360.392588] Error parsing options; rc = [-22] 20:04:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0)='+', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000100)="3fde71fcd7d70314561ebd0e2a87e8737debc22e338d61c4826a2cd07167c0ecf0e06e67efde", 0x0, 0x2}, 0x20) 20:04:12 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x80, 0x400) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:12 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) sched_getattr(r1, &(0x7f00000000c0), 0x30, 0x0) 20:04:12 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x200000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5411, 0x20400207) 20:04:12 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40600, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) r1 = fcntl$getown(r0, 0x9) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0x5) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) fcntl$lock(r0, 0x27, &(0x7f0000000000)={0x1, 0x0, 0x3ff, 0x8000, r1}) 20:04:12 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 360.668285] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 360.676350] Error parsing options; rc = [-22] [ 360.678771] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 360.687411] QAT: Invalid ioctl [ 360.695857] Error parsing options; rc = [-22] [ 360.737902] QAT: Invalid ioctl [ 360.748123] QAT: Invalid ioctl [ 360.769228] QAT: Invalid ioctl [ 360.780910] QAT: Invalid ioctl [ 360.800989] QAT: Invalid ioctl 20:04:12 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 20:04:12 executing program 5: mkdir(&(0x7f0000000680)='./control\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000000200)=""/168) 20:04:12 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmmsg(r0, &(0x7f0000002c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="656515b9bf33d8092a27745373", 0xd}, {&(0x7f0000000080)="eb8252139bd34ccf619fa25240bbd8d945bc4693f32c2c25f391008be20d6b65aee0a9d9575fb43b9a05027e529ca283125d78bf876d3305df274ed9de84", 0x3e}, {&(0x7f0000000200)="8cc485d954a997510094c8f4663b6fa773b4b2be5f2b969b695ad1cb1c68492ef7a7872cf9af7bef600f22c5a443d54009732328", 0x34}, {&(0x7f0000000240)="5742e5b9339905945f6928443d4fbbd9625ad5e0f79bc4d40610f0f17631c28f4ed3e3e721aec36bba0f805b90064918d43d671f7cf3dbd447eea3b4d356335e5bf89b8c1c5e40", 0x47}], 0x4, &(0x7f0000000300)=[{0x38, 0x11b, 0x0, "4833778cfa1fa8ec06a6ea5e5b62de4680b67882da5bdca2ceb24dcd71d443fb79107755b4"}, {0x10, 0x10f, 0x8001}, {0x60, 0x107, 0x8, "0ead99e91d6df0d299b9b3d19839490d8424d4646f1abb3bb97d718412387ed31140a7bef61e46feef24be604d08f13d2bd63d717dab6737ee827e00a4e514fceb57290adbb14635d7d355f317"}, {0xd8, 0x13f, 0xd9d, "0c8712a4b758beb25b995c9476410ccf9aced3e8c7c0458c3c94a12005b3a3603249d5bb07f5df503dc85ff4b80feb471372ae452c2188c0c8dcc1ae9b7c6c78a35710989d045e9e5b4826c8d2ce645738faadb4c127932d2d162cfc8d44de80442bf5d7230fc38c3f81d9472cdae031e16f4b845689bada7f816631f5ce94de90595be50bffc2c56c690075d79a1b4d1a5cbee46d84bb4d85f74f71f355998bdb5b2ccc230a4513f0db9d495cb0e18a84f5a3fecf8d4e3ca17c06059d0c7f723be1fc"}], 0x180}, 0x2}, {{&(0x7f0000000480)=@isdn={0x22, 0x5, 0xffff, 0x7, 0x10000}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000500)="fab94a903c532a3cde404018a9f2531815ac3ad6da7b1e768493053873f745587793a6b9a807e7305948212562c3986a1f0f1c079e5c34f0bc48b2db11d11820708b4ad2a205fb1c0e540a93caae0c27597b5a2a6c14c3a2b39d5060ecdcdc6715819bc8fb747b9a21d93118d5d374222c00e6325545e37420784dbdc5665ac052f896689da1503e92add49b2065fd5e8edcb76f2cb484bf2803053d3a07c167e6492b90cacb70f897f4851c68c1787b09a877bad146c8f907be", 0xba}, {&(0x7f00000005c0)="b439d9b1c041cca9f13acba6a552b0912667788b0c7d8b7e1617f02cc833357bc213b04f2417c1c5c99c9caff2a4b36ad19743dbbfc7635031d49c9d5ab21d86bb40f5de7561f0b0ffeea3561d0a8443c420b3a2e8b72175d0", 0x59}, {&(0x7f0000000640)="45b2062e14a6d265235ad4bff8e90e491e4cb90a0c308f65fcb8", 0x1a}, {&(0x7f0000000680)="22a36b13c692a975fb163d3150c4c6947a7befac6c703c5fda0a5e9b61874320b16353fcd689936f94202345d3843447c609d78b71a55404989835896d5c1c38a1979653abf4245de518da85be988deea277eb62841c57933a4387123e23a432427144465034ce693ab96683bb08acf513787837ef4d50adb5079308d1eb59a78c1e931360fdc0bfd110180d071616196d91cbd62347a85361ee9ad9536ffabf1d3658ea83d2f4bd1b3e9b9ad009cb00f05f1c07a86516ea0e9807d9dff140472fcd917d878243c32c7c4edb818ccfb93249743875ff38e37a24636230ae75a84f6097abb6965f9ff0ecd7ac2eca11516e1694ca263c8b23b7a5a1f37296763bfeefab569ebff4eb08a9d612d467755ed8da86d74cb460ca0f75fe1c6afaff3192ca1f5452fd260619d4c4a82c9eda6e5d8fa39415807ce687a9cc5e1bad0052be4b9cddc3e49c9a5d102bdb4216640468fbe0b7790db8bcc70528f78d5df4c2df5ebf9d3e96ee70b3abced2e4e129a04e51c64ed91be3da919434c1ad281c6f97c716c898dc292d15cb892ed1cd60d442aef8c42c36d134e2fe10fe3f5d5bf98e8d091893e9ad0314b3e63142f0104bfeafe32d85a438f21caa1b5309fdbe4fc018632244e36cd851f5e13269aabcb13fc6c2169aef44bb3e3524c69552d298b33a0863a8cfb372bc2ce4a42fd99fb073f506e95b48bcc7177cf95537ace129419bdfc800a1ff9fd406cab8b4385f12d7ade24f0908908b2fe4689d75249849fb763438f5d370a1c0eeeb600c1afaedd5e8e72ad996c146babbbd7bcaa16fa8a677d4559a439422b9edcd2633dba5e9610769e896cdf0cd29c30ce4575f2e86a7d40ea64a2383b4d3053679bb53f26e3dce0b2b0e7af6c87b114730592801da03a24e9cd86d8a77fab4da0745e26fe3796f53876eece1c2c54a54f68bee05016bd801a3b95094b64dbc84cf96cc4bfe7079f08e35eb7ce8469bc62454e72252bc42f53462530d73ab822ed75bb6f2d2c83850536f959122e0e5fdb31ec25149d0d3da23145bae16cc57432cdcab6c3f297e102cab50231560570638132999bde6ccdf89bc5005d806b316c95f03acd1885ea2882d168c0d37dbe0a9aaf5808ee0692b69d24dccbc087ebfea2a45decb926faeaa372db6ebc523511b0f82c3494e6d939ec03935b2339268eb46dbf3ddbf3a42fb9225674cc85ae03fbdaa17a4d90d5e08a78bb9f97600d5e04cccbe06602dac5b5babed932ad121a173ba8584395d235d2934810f9d3fba73cf34975e6aa636641c54541220c713f5b546352d2e154c166c0b873fd2f126960deff26efc4c8f7ab1710d5bbc75b3112d8b8e2b5d2f172e25245b3094156dab057e8771a48291cf4f452e9e07df43dbff7826899ade01e93099c3a6ed6914ce807e9693f8c8970659e58f9115dd55828938a4facd3397a315585337c9468848292374986ccaf9652df4422282210720c61e526deaec81e76b9aefde02190d495367a6c055a280c65817080bf22d44543cfdde91059bd35679eb9f7317aac880f5ae32363f5457efe77d004d2e2ce7a097270434789e03429d91c43b53921394781cbcef51bb5c67103817e9dedf9d4b05e515b97d9466a12ecc4cae8115322ebb6ea85b6d2187fcf4ea7b3bcb5aba85153edd3dd63ffcd0a7b1770dffedee46d15b2f973598fee3e45cd8b002dfd67df63b7599430bf2d99d3426e060f3ef6f641ffaccf9685b26a91bedd742db46c7d307598b13f31f6a3dd9bd2853e2e789be6e5c9ff9ed6670d6125b88f041609fbc8680026cf96c5157ed9cdd4d99acec4fd5361474bec1cd8e91419ad28f6bdd304c7631db62fe5bb93b67eea4b0f962d6b9f01ba53a3ff17dfcbccfc300cd2b0ca5b1769330c69421072ed46235592000a93d071015c77ea79c0100ca1de3dcaa8f6c19021ede133fec55070045f647a344f98d931b2631592a9efc16333cbe8af8ab9d587d242fb4ddf41f679dc9c791e3b0a8292b3f9dcfe5b712d2d33041b17fb8f7c801bf4836299daecd34460060081b9c78183b8ef60ffd3f68e02dabf1e8ff09a493a0a66e9e564fb1d8bf2249b442d6c7ef674e848bc750b282946329e9a433291cc6845b2a2b8a16fd4e15fc6a66c33149573cbe91ebdef067d79ccff49c8bb54503d27b5d512e7a16d86d8eaff57d4ffb741dc26449595301aad977de0093448bede7f2eac2d5af403b715bb7bd1bb36d324da1e7da6fcde78cf8dbfd428bfaa723708a40a3aa38d7cf4daaa338a93e2b361f7ab19843b1b7b8e259a4a30b3ba8b8dcd7fad4ca4753660c001e28d9e3fb840b07820fd8280766bd65f5b2e37a140292cb4808a116247c8f2630b80140d9437d47bde8e74cacf206c46f75b543fc82b9896f59cfbc9a5326f0e3b5f74b1ff0a7c53777ccdab5d4de28653d943a7b5bd920bb4a50d27c74a5c8aed751c400fbb1de8687342e4e24c5075f6ebf6b2d91951ad13a4965e4b150d1d2441155b119ba6fd665f7e5d1826354daa83c032e1afeed359febccdeaea9f7fe8bd224b328e82f530e530d5094cea80448388842d51252e844aa4c42700ef972aaf9fc9fb19602dfc105b1f5080e79b542d10ed3d76f275e102d51b4704b67379c3b786017f982e6c994eb99768bd42aa5a5a3aa7c8d0d178ee6dc5ea307b78fb917c9fd76476e1894a65ab2309659764f043be2573d466e70b388216a3d765611581eba05808f8817cca1e3508835d7a64c31066d658575924b1ca6cdf2af017786cb0a7a29568a6f24eca076fdb65cfdb816293230941a3e7812d1fc772221f3d0af61acb403bfb861830e3aff9e744b30cee930b08fd3a6efd2f716b5a8b80797ebaacb607bd2e30c1c962562cf89c90d1214f94fe40c84332b2bd2e36c707620553ebd110eeb7507cbf98a9f91f7082f65c559978685a2bf2bcd72dd83ebda0f28ef905a9e1939f62ce0a59af89da6d416c2230dc02d6ad702ff0b0579df78741b650f9601133c009529513f3f03c251817c329257d31443abc306053bcaa7f5a017c83ff25670e2e787381be6b723fda3b6e4683131ee44e795248c4e179203716e30f82420de3e9b151a453ab9e10bff422a90c0323250a37031fa2c6e81e5776726e8171db84403d4882697530cb32e84e752242a55b67753ad761cde35e0b49a353ab3a3f3677f788e626dd5056de5b2f378fc0c60ce86009e612f57758c091267776e77baf39bc4fdda251e6e4b946d6354cfd4a1a0a670bc15468581152d03bcbe875cd95fe9ff09fa49a904b19bb018ddcc593c4884409f534d6948cc306176381e0eb9d10d50927a3cf1aa453db985ab2bd8629edadd31776c3daffb85307d93e326254fa9846360df211b7ca23564fdcba0ff08df43d2493ecbd5e605aa6461e6652721933f92af0983033037762a1a283600bc245796318d90b11f9d554ce747f2369f3af0a49d4190e8a0d649dd5756344e2ff30b61817dd7f5596c173cad768ac71eea1afc0525d2132490f3f533ffa60495a2a7dc40b6506bd6b0a4cb556bb8d1af69a8e906ed6be271c20bd77ca923567c89eab504b87e2d2328ea32830014d802b1d689d339d6a3a6937777ecec00c3d79969b6acdc9da439560f97badf3ff88e401d6e7272433d973f603450d9c5d4eb31e6762c1c3d79b41248651c9c84bac056be3f3dc7999916b66111050cc4fd8cc823053b32448995ef091a007e0ee57f3400400001354bc2107e80629f6859507a7b68cfd0554271bb604772e941a7ca026ae2644046fa3bab5f42ebe7892453ef061c159ae4932b20c7d1c834612d2d9dcaf28ece3365c7e2c1620d14b1ca389f45f51e7cba050306e6dfde6b9334e359444ba0853f2876d59eaa93808acd72e2f02037d0cdc7b43c5932e78a7088eb1cdac2c2f7d94e0e8c940dfc8659fcb8458e35371d806f54dff303fb9c8762f191a330f0bd998a2c66527bf2b633657c73e2d1b541babb1a0eb9608e0aa544c6ac218f4e00e951d3bd3d61bbe434f670e1ed948a51a723f131749ae8f3cc2c5463bf48e30121aa5e6606c06228fd5241c0f5206e943d26a3291dd87f7dc7b79950c6fe2b5aa18f1d03535dead51faf8ceff1168685824a78c6cc3d07be78c8434f8475b179d507de22d33d13cb25892b0ba1bd30cd88132b9c229760f9a15a32a3818159064529d1e5a673fca197ff070ace415ecc7d2feaf7605446333a0173bd03a6d5409837a8396be4ab7f6a9b14262b8d8a6b5a262d213a0090f8a8ac61b174a029bbd3fefe2a66735b1e8a2cad43b20c5053a9f9eb64d97c54efbcf936a9ea2b77c80520469dbd4a5a30ebb755fdf224adc7b2f3f644a2fff17d7d514f9770e8f78755df4c0d03ed5f340e3be76d8862469e6bbf01788893cc73b6e45f18cbf382f63319e6fc09f0430b4948b53e19c301622e45d349988ac177010004184ac8594438e3b91ba109c580419e50020772dbc9fedae52d9a0e3d29ceaeefa95d6388c9c21a89d8fa1c16cc9364f929c6b092eef289192787efda9886e6e0ea4adf85c9679fc98cae28a324f62d2356a9bdb49e90db19daffa7f10b861634084bce4293173f3f6977c3f4af8d8a7bee25d2762b8209f20880deceec27359e7e098fced16696d28c6325e71a1dfb9b68ce893b0e4fff1ec5fb2fa7bc4bb8c9773541da84b871dcadc6e79006b9f5997c9f08a831ce09272c7c9cb6ed64ce109a4993aaedef29c995ee36807c4aef3440b7a8b8c44e091ba540eb77d0bdf958c2304b5a1fec794c9685851a25706e2aed4d0311026587f9d900058dcb6e3bda596e09819bec5bac25c48b40f4dc7e73e7e9000a130052f2737b30136bc4074b72925572c51ad297238e55f2721f3e8fdd3ee8b42fedb44cfd73e20fe2f9e7c7b871aab1b49951f020e7e918d7ebc8a6d50bb974c2f00ac8e7642da66adb8f7de954d517552daedf6d38e97c11ba1205251ed154c5dd8f050ba67f816d77d0da0064d74b4c32612cc64694aaf37653403f3c3a5d56e59132f424c41e88754f9f1de92890813720e4c439f8d13ebc53c398b9930d58b3a3693c010d1bcb072db29c237449416976439311271c218978f53b28d4ff05131d4a03957f2e2928aca1a8e0e1638bc24c3382189c0902fc6a3d0bce819e0319d8dd2612da74d71fa7181419c4cb1723ab24b7245a357982c339cc7e1cd1338ee39f4e25b608be462c15e3cfe0875ff34c60f660db6421a6ac75d4d4d8f4de841c4a20b65ac9a9567f565bd0c0dee849d4b055eeb7ee592bae26e17c720de0f96c9b89aaa9601ad7efe0f19e64feaca6a9266af02aaee7092c92855c309e162f13db797b75134abfaabc6389a69b16df67680027bd4b14d171f9a0b0f6c53ed64c88b3b5202c31da563e8b1fc104c4f6ae1de11dc7e815b598a548db9dc6215c51fae36c2a035755f05b0e66fb272498f20de1fff5bca955831cd86e9aa0cb4b5b7fc471df14435727f7ffcbf6a5669be5aaae297c994b24c41470321befb38ae1122fb2c05854bac6e2734ca9055774f585a40ea3e12eccb824b71dc2f69a204ad8a154db489947925d82602809c15d57788e84a63253ae7a6ccc8c88a5d6690ff2a1e1d8ab221bfe6ea51f2ef8e057d1b2d0a6d0803918816da45ee2c2446f42aeb15a7c825c94050795ebfd0dfa3ca5926015eb9e3d984bd6c9f1a978feff981ca19a049572ef549e24dacff5b9e8c73669cf6ee732894f87fa4b3ed688cb2b65dbe3369f45fc992a6b4b62ab5f90c76d", 0x1000}, {&(0x7f0000001680)="f818f9802c49449384f4cfbf95820fc332c4a53382f91df2f2f3cf3cbe33cde83cbe6a5a1679dfbac105b49efdb460816334792f8381afbae6d32d7721c5581bd38a9697673339284d8af7cedace7248050f9bc3e2fd98c39d27d36fa64c2783ff15a87d5e9b065a01b9fade3287b2296ee85c7f54472c66035f1163dde9c870fdd1123dce85575f2d1cdea85b0d0db3cf5bff4f234dadef1467239c920a3debdba88c59093c26be3211b935f8c5aa1ba79fe1309586692af9e5ef94f9d30b8ff50420ced185b1bd319cdddcf4b8", 0xce}], 0x5, &(0x7f0000001800)=[{0x80, 0x10c, 0x6, "4b5f8e7d7dff263c1f642973fdcead7ad533e8edc398173eb1e0aa58ba29261f5d7b815492d190cbf3227ba6dd5843a4cc2b501719fde8cf07d972caad42402a9df52986acbdab3bf137b8de2abc092107aab53aa8e033fb6826be9f207ad1a06c1c9e2571ac9634a573d0"}], 0x80}, 0x1}, {{&(0x7f0000001880)=@isdn={0x22, 0x7, 0xfffffffffffffff7, 0x1}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001900)="a8400cbd9a5ee4f978ce5312762bdb5406038bc5972e7f99ac08bf327d6ed2c36c7857c3e1cd324ebb91274fc9dcb354f90a3d997cfdc5c8028956858aa7fff42013bf56699da29f4836cc44cb9540966e6fcc56e52c15a7073fda07688b49745805e8b24860c41930c8354dae53293d977d5032aeba7e8ef4556a795f49715760d67abb2e504f727b3d0070562821413a8d0a48a2f5af054c87038ebe44d22fc01f84083a7c6e96610b2ddcd0142e24d0fbb766a4eb527f4a5f", 0xba}, {&(0x7f00000019c0)="b83b81", 0x3}, {&(0x7f0000001a00)="637326403fc3ba97c38b422f9a90905b93ae1f75f1e93e1484a89013bc4aef2009ddf6039cccd1f7825c11f193cecfdf1b9623d589848c25c7a5de9d452e0d1d671a7931bc02cf97bebbc92002ed2a3a29b08c52b435360120fbb2ea45af1c7d6b8058333338a9bc1fb4e0a24cf3f0f9077ec8a05fc5dd56806a9c6749eb603d76c2c988bd96dd58c9cd8fb69ab80311571a06c4760eef82f4c8cbabe813cd0bd3b0e7", 0xa3}, {&(0x7f0000001ac0)="39c68c30d674a6f3ad4c14194bc0d67d0eb2febdab253c7b6503a892dbd75d364f63772d2fa471a6832428ab42b7720e0d483d5b31d0ae9a44ca3107d407693b444caea965e4b36055a5ee3333625d2b5bde386bc5194ef3a2816823d5872f5b3e17a283ac9da52f4a844ddc7c928c9e523814c2b17e4fffb90359625b994a25d12bd81dc0", 0x85}], 0x4, &(0x7f0000001bc0)=[{0xa0, 0x112, 0x400, "54ecdce5b54976bd74d9c7a1b5d4a43ec58eaea51fa0d7cba95aa4cfb22b56447b66051139a60964e5b9ae595feb70aa002eae526c6dbc9de651f99f50d7cf2dcb4a1448c0c424717c7885bf14f0b43c05b74a481e0ee732b4af0cc1d346d4ee242a4a5fdbc4c1abb6ff003c456101f91fa420b1eb9f92a20130819118446b43fb039ae11f4b712ee1"}, {0x1010, 0x11f, 0x0, "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"}], 0x10b0}, 0xfffffffffffffa5f}], 0x3, 0x4) write$apparmor_exec(r0, &(0x7f0000002d40)={'exec ', 'ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02'}, 0xf4) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000002e40)={r0}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:13 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) fcntl$dupfd(r0, 0x0, r0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x20000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) read(r1, &(0x7f0000000040)=""/200, 0xc8) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 20:04:13 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:13 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0xff) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) [ 361.075947] QAT: Invalid ioctl [ 361.082070] QAT: Invalid ioctl [ 361.145025] QAT: Invalid ioctl [ 361.165377] QAT: Invalid ioctl [ 361.198143] Error parsing options; rc = [-22] 20:04:13 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) 20:04:13 executing program 3: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000002c0)={'bridge_slave_0\x00', {0x2, 0x4e20, @local}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xbf5db6b06da4a6ce, 0x100) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='./file0\x00') 20:04:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f0000000380)="c2", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000002c0)='\x009', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0)='+', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000100)="3fde71fcd7d70314561ebd0e2a87e8737debc22e338d61c4826a2cd07167c0ecf0e06e67efde", 0x0, 0x2}, 0x20) 20:04:13 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6) socket$pppoe(0x18, 0x1, 0x0) 20:04:13 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000140)='./file0/file0\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:13 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb4, r1, 0x8, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x981e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x15}, 0x20000001) rt_sigpending(&(0x7f0000000240), 0x8) [ 361.536762] QAT: Invalid ioctl [ 361.542162] QAT: Invalid ioctl [ 361.569718] QAT: Invalid ioctl 20:04:13 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) accept4(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000200)=0x80, 0x80000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7) r1 = semget(0x2, 0x4, 0x80) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) set_thread_area(&(0x7f0000000540)={0x2, 0x20001000, 0xffffffffffffffff, 0x6, 0xfffffffffffffff9, 0x1, 0x2, 0x2, 0x1, 0xffffffffffffffff}) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000004c0)={{0x152, r2, r3, r4, r5, 0x2, 0xb05c}, 0x0, 0xffff, 0x8}) [ 361.594887] QAT: Invalid ioctl [ 361.602545] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 361.611349] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 361.623973] Error parsing options; rc = [-22] [ 361.650712] Error parsing options; rc = [-22] [ 361.702550] Error parsing options; rc = [-22] 20:04:13 executing program 0: ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, 0x0) 20:04:13 executing program 4: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 20:04:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 20:04:13 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0xbfc7b03f0abc8) [ 361.961883] Error parsing options; rc = [-22] 20:04:14 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x208000, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='squashfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000100)) 20:04:14 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000200)={"42abd4de61629705a71fcbcba773add59fc2d10ccb08ca7bd1f57327ff7189f783ad3c749df4b3d07df9c6acf4ff2fcf45764364bba687f66b10647bc14433f37aca6e3a6aac811baae0d6e45af177c8dbfb1e19c0354da1caffff1d6576969fe4b18e05a1cfbdc5b00ec52835308099f05b7483513dd320132df6f27b5b458a55dd58f30136f0fb063a06e99454c68623d50661f738454a96e0d00024d27ff8443ff0a38f6ab8d9592a47f62a1232c7f1bf4eafd635423dcb36ce0685c26a88be4d2f13634277c41ca6755827f91ed102b48e812ce762f381ec869e39074fb7161211091bae143203e2b8caa637294d22b995b3c5b1f7822352e48fcb8571e1ae7904c5c03bbaff5e74fcce49ee4da61c46406e7f0fd1d8466d1825f134872685fdbe42b63c80309e1bb364bd2a2a1121ef66872331e632fbe8d4cb184abc43693e2592dde90b9675ee6a3f927e68d4398ecc57f4e5da06ec32e80e1896eecc365b228fddc478dea5a30fcc23a1790242acc23f8a27c96603e951c21d49ff3fc264a95ca262671d812db944d36072c8bd8e6017452c5f8a7bf2304f6a56506bf59c432f43d418b526b5eaacb10e6c12c96faa799d1b64070d61c3dcb06a112e4ccbec94080e22b2f71610a30121c2bd47318fa81dbcae50ce92413d2407852ecd58c297cbec44be59db44dcca34c38c42ddb1fe287793b2b887366bc55f3f2fce77e367953b643efec5ef991c50f086fd2e7121c6ddb412fcea330fcc74a8e5697d290c73282d84037d63bd0701a715eb475721be6d39edbbbb5dd238d9186154d985228b0578be270c362090210c619e21e2dbee3040b39f2bb23fa2a66baa7f0d6d2db98cea8125b8fe8f81c66c8d8f0868ee97a73f4ad418ca0f3eac98fcaf7e2060333df74660ca9545c24c1844b606c965022958d22de5a87b880753ed922cc8cac3c647096b51d78a40e11f2c6613b603659176e2b426d34f2248ad50c458754c495be01415d28af90c3003028ac14e3ed2db2f36e0ee098cfe47ab179b9f2490de0db8b58bd57cd591ea8da803d4b9bad01036db9f29db68ae4a2d08cc33814069e151eddcff7d617ef72630ee1d26b99dd7792f74cdcb745b86d8aed32d41d4643ea1d1b972435a08eb45aa99f7fe56f3d51bae718a1c9dc556b8bd28fc5072d0d3a03ccf7486030961263b1bea8c4bd482879b100c9c02a60102bbdba2e6a217a92f9e289bfafc2ef04c88f1c07ced3d8b6431ef3edeefc308edf18b4e4a1f2a17d7dd66877d883a68beb9eb160544911a70f22f3596ad8f7f908283db98a74f0ec0cdc198253bf9f1db8d7c5e83bcaf9dcc343c5360f0212eae558889a393c8dd6f1b86c4f2f6f19b4aeffd8697ff7412c1e3fd6795a7420b70c667331df0a039f8b0639a32dcec710f69a6fbb66abc3d9834a7bc24e62ce25582"}) [ 362.009368] Error parsing options; rc = [-22] 20:04:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pread64(r0, &(0x7f0000000080)=""/194, 0xc2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1000102, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) 20:04:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @rand_addr="1def0873ed790c1cb7d6f3ee191ec7cc", 0xfffffffffffffffc}}, [0x8001, 0xfffffffffffffff7, 0x1ff, 0x5, 0x1148, 0x0, 0x3, 0x291d, 0x6, 0x8, 0x400, 0x80000000, 0xfffffffffffffff7, 0x0, 0x6c]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x4, 0x8001, 0xdab6, 0x1, r1}, 0x10) ioctl$PPPIOCDISCONN(r0, 0x7439) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x4}}, 0x30) 20:04:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x5, 0x0, [{0x40000001, 0xecb9, 0x8, 0x3, 0xffff}, {0xc000001f, 0x5, 0xfffffffffffffff9, 0x20, 0x1}, {0x80000003, 0x5, 0x1, 0xfff, 0x1}, {0xa, 0x7, 0x1, 0x100, 0xfffffffffffffc00}, {}]}) 20:04:14 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) write$FUSE_INTERRUPT(r0, &(0x7f0000000280)={0x10, 0x0, 0x4}, 0x10) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f00000002c0)={0x37, "3894748ab566e7d189e3fb9bd9fb79ea638558c305e04c634890f5b2fe522287", 0x3, 0x5, 0x1, 0xff, 0x2}) [ 362.317197] QAT: Invalid ioctl [ 362.362209] QAT: Invalid ioctl [ 362.439349] Error parsing options; rc = [-22] 20:04:14 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x200, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x1, 0x4) [ 362.474291] Error parsing options; rc = [-22] 20:04:14 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0xfffffffffffff800, 0x4) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 20:04:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8913, &(0x7f0000000300)='0\x00') [ 362.602569] QAT: Invalid ioctl [ 362.692776] QAT: Invalid ioctl [ 362.704159] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 362.713068] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 362.725563] Error parsing options; rc = [-22] 20:04:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) open(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x4) 20:04:14 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, r1, 0x19, 0x10001) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0xa71}, 0x8) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 20:04:14 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x800000, 0x0) 20:04:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) syz_emit_ethernet(0x168, &(0x7f0000000000)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x132, 0x0, 0x0, @dev={0xfe, 0x80, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x700, 0xe000000, 0x0, 0xffffff88, 0x0, 0x2a010000]}, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, 0x0) [ 362.812922] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 362.821913] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 362.834414] Error parsing options; rc = [-22] 20:04:15 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 362.970274] Error parsing options; rc = [-22] 20:04:15 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) r2 = getpid() setpgid(r1, r2) renameat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2800, 0x0) [ 362.992113] Error parsing options; rc = [-22] [ 363.042679] protocol 88fb is buggy, dev hsr_slave_0 [ 363.048378] protocol 88fb is buggy, dev hsr_slave_1 20:04:15 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x105000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = eventfd2(0x0, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)) io_setup(0xa3c, &(0x7f0000001a00)=0x0) io_submit(r5, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r3}]) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xa4, r1, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8c4}, 0x8000) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') ioctl$LOOP_SET_FD(r6, 0x4c00, r6) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000200)={r6}) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xa8, r7, 0x924, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x401}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r6}, {0x8, 0x1, r8}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x30b1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4010}, 0x80) [ 363.084084] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 363.092172] QAT: Invalid ioctl [ 363.093211] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 363.100913] QAT: Invalid ioctl [ 363.108644] Error parsing options; rc = [-22] [ 363.198286] QAT: Invalid ioctl [ 363.227078] QAT: Invalid ioctl 20:04:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) write$binfmt_aout(r0, &(0x7f0000003640)=ANY=[@ANYBLOB="0004063fc90000d892f86900000016940007a90f3d"], 0x15) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) readv(r0, &(0x7f0000003580)=[{&(0x7f0000000000)=""/13, 0xd}], 0x1) ioctl$TCXONC(r1, 0x540a, 0x3) 20:04:15 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x1) mount(0x0, &(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000200)='qnx6\x00', 0xfffffffffffffffc, 0x0) 20:04:15 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x400) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:04:15 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) sendto$inet6(r0, &(0x7f0000000080)="6ca27b1ee79b8139cf9cde7fce345926d439f282934c628f4c366af7609e8284d921984f334e10471d50ccf2ae00e1c2c6d344cc06d13ba93f689c93498b2e10c25e5c2c1b98dc64d09b69d8f7f0c0a6deef491d998e975fb156278036162dbdb4603d301ea7181332a05ce6d9ab1df768c4b1879319647905f0ac585a00d0a88545dd784ca2ed8c67c2d9b876d615f0dbe81b26e2793f0f33ae71802dbec9d2cdaf096587a2be178d35bb3ec330e61723e833ac2de236e78dfeb281e3c92db170e3c2a496ee85cdcbbe421836c0abeec22df0017619dc17", 0xd8, 0x1e5a2c3f8561581b, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback, 0x8000}, 0x1c) 20:04:15 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x3, 0x1, 0x0, 0x401}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffffffffffffd, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x240000) 20:04:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x20000000007, 0xffffffffffffffda) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 20:04:15 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:15 executing program 3: lsetxattr$security_ima(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "0d14d1a5e9"}, 0x6, 0x3) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 363.620111] QAT: Invalid ioctl [ 363.692396] QAT: Invalid ioctl 20:04:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 363.781305] Error parsing options; rc = [-22] [ 363.856091] Error parsing options; rc = [-22] 20:04:15 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000200)={0x5, 0x101}) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x4, 0x1, 0x2c, 0x7}]}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write(r0, &(0x7f0000000000)="b2ce27fe8a554ac778a45e8e13a1e90209e7a3900406365e7c9cd3d6dceba8472cb95ebc2478ad8fd14828a8f183f83384716a0511b49fce2527e71adadf96952295f5d61564cebba7b5d0d7c0d2120a1b46855f9496e2c51e41c1d57bc3676cd35747a8cfa0df226b2557004c7677e5efd8460f13c9a75ae347b32869c0c54f2a843c25ddd0409ada7bfc9d365e302f9b40c3bc4a466955f82fce40981213d1d5236e033e82af831ed9a187bed0a20331f2c1c7f1d76f2363b85c9c8590feecca66ed12457ac1f99d6d60a16fd7fd3fe0d02c37b97ca61b8bf0081529d14ce67338dc2fa5b2e0972ef86a7085cdac618757670a9923", 0xf6) 20:04:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@initdev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000800)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000b80)={{}, {0x1, 0x5}, [{0x2, 0x5, r1}, {0x2, 0x39b823b63304b594, r2}, {0x2, 0x5, r3}, {0x2, 0x6, r4}, {0x2, 0x0, r5}, {0x2, 0x5, r6}], {0x4, 0x7}, [{0x8, 0x2, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x4, r10}, {0x8, 0x0, r11}, {0x8, 0x5, r12}], {0x10, 0x7}, {0x20, 0x1}}, 0x84, 0x3) creat(&(0x7f0000000c80)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:04:16 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x8, 0xb4}, {0x3a09, 0x9}, {0x8000, 0x100000001}, {0x80, 0x80000001}, {0x7f, 0x6}, {0x9, 0x7}]}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000200)=""/119) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 364.024889] QAT: Invalid ioctl 20:04:16 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x98c0, &(0x7f0000000140)='ecryptfs\x00') ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000180)={0x3ff, 0x457, 0x20000000000000, 0x0, 0x101, 0xffff, 0x9, 0x4, 0x80000001, 0xfffffffffffffffc, 0x7ff, 0x3, 0x0, 0x1f, 0xff, 0x7f, 0xdd, 0x7f, 0xfffffffffffffe00}) [ 364.063412] QAT: Invalid ioctl 20:04:16 executing program 4: r0 = shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) getuid() ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setreuid(0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) shmctl$SHM_LOCK(r0, 0xb) [ 364.125045] QAT: Invalid ioctl [ 364.166096] QAT: Invalid ioctl [ 364.182018] QAT: Invalid ioctl [ 364.198103] QAT: Invalid ioctl [ 364.240938] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 364.249938] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 364.262432] Error parsing options; rc = [-22] [ 364.291821] Error parsing options; rc = [-22] [ 364.318544] Error parsing options; rc = [-22] 20:04:16 executing program 3: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x200200, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000040)=""/118) sendfile(r0, r0, 0x0, 0x9) r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="6fd669c6fd23a7727c64eabaa548a1d7a5be73f395308ff40b26dc3b7533429a9f02347032ee69fd755bc4077eaf8472aebbc3fa0a1e834a25be028ab23c7b92016f4e331842cbc984cc3cceb4fa59a4a53859b1c04b1fa4c520d00340a3628664d9e86c2aaba87d3fe34f424346d55607e94853ba93afd24209963889", 0x7d, 0xfffffffffffffffd) keyctl$clear(0x7, r1) 20:04:16 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x6000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 20:04:16 executing program 4: r0 = shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) getuid() ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setreuid(0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) shmctl$SHM_LOCK(r0, 0xb) 20:04:16 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 20:04:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x7f) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='ip6gretap0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000000000ba00", 0x1b) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000180)=0x7, 0x4) 20:04:16 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x8002, &(0x7f0000000180)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcbz\xd8\xf8R\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06') setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x3, 0x1, 0x1, 0xfffffffffffffff8, 0x8000}, 0xc) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x7, 0x4) [ 364.675886] Error parsing options; rc = [-22] [ 364.731143] Error parsing options; rc = [-22] 20:04:16 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1000020201) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)=0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) setresuid(r4, r5, r6) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r3}, 0x14) r7 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r7, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r7, &(0x7f0000000200)=ANY=[], 0xffdc) read(r7, &(0x7f0000000140)=""/165, 0x1000000eb) ioctl$TCXONC(r0, 0x540a, 0x2) write(r1, &(0x7f0000000280)='E', 0x1) fcntl$notify(r1, 0x402, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000500)='cubic\x00', 0x6) 20:04:16 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x80) openat(r0, &(0x7f0000000080)='./file0\x00', 0x181202, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x20000) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x10, &(0x7f0000000180)={&(0x7f0000000140)=""/35, 0x23, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x10, &(0x7f0000000200)={&(0x7f0000000100)=""/57, 0x39, r2}}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCGETA(r3, 0x5405, &(0x7f00000002c0)) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000280)=0x3, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) ioctl$PPPIOCATTACH(r3, 0x4004743d, 0x0) 20:04:17 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000400)=0x0, &(0x7f00000003c0)) r2 = add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="fbd29cfc9722b780fdfb206cf1c0022759b3f3e2725dc985aade873e900193b03bc8380b7cc79fdc0db64f7e084ad685954733eb6abf20bc14489d", 0x3b, 0xfffffffffffffffe) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r0) keyctl$get_persistent(0x16, r1, r2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ecryp\xcb\x895\xee\"\xeaD\xf5\xc7\xf5\x80\f\xd1\xff\x16\x0e\xc7B\x92_G\xd9\xa0.\x0e\x10KD\xc4(\xdb6\x83W\x7f\xac\x0ek\xc2\xb6\xdf\xae\xd1\x0e\xa8\xc7W8]o\xe5', 0x1, 0x0) 20:04:17 executing program 5: accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x8) write$P9_RMKDIR(r1, &(0x7f0000000000)={0x14}, 0x14) write$P9_RSTATu(r1, &(0x7f0000000040)=ANY=[], 0x445144e9) fdatasync(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f125a123f3188b070") setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 365.032751] QAT: Invalid ioctl 20:04:17 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="ac0900004b4147ae172b0bd12798afcd1472dbf8440a1cbc8cc2", @ANYRES16=r1, @ANYBLOB="000325bd7000fbdbdf25110000000c00010008000b00736970001800020014000100000000000000000000000000000000013000020014000100fe8000000000000000000000000000bb08000b000a00000008000800030000000800040001040000340001000c000700010000003c000000080005000200000008000b00736970000c0007001000000002000000080009007d00000008000400000000000800060002000000"], 0xac}, 0x1, 0x0, 0x0, 0x4}, 0x48080) [ 365.068118] QAT: Invalid ioctl [ 365.082559] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 365.093784] QAT: Invalid ioctl 20:04:17 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x16, 0x2, @thr={&(0x7f0000000200)="2aa3625dcd73121e753744f561297d7155b3ca293d671a4d0f3f40c6404aa2f09fb3370903ee1dce8f4932630977af5248aa131d5a09986cc8ba9bb143f8e9d3b5b11541cc799c1dce01801a31bf75491175a6efd2fdcd320f4c54640a29b1b5f7fc0496d7e1408f850779e9b041e39ca92e0e8e420b566fe3bedeced3e23a355d7cf4c4dfa54046afb4242890189a3e3c44ae0ba9345e4993e5d80bff6d2ac024ab3761d282fd5a6b975ffe91f71aaacc1c", &(0x7f0000000040)="4450efecc23a5050"}}, &(0x7f00000002c0)=0x0) timer_getoverrun(r0) [ 365.207246] QAT: Invalid ioctl [ 365.222412] QAT: Invalid ioctl 20:04:17 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_emit_ethernet(0x8d, &(0x7f0000000240)={@dev={[], 0x10}, @dev={[], 0x24}, [{[{0x9100, 0x401, 0x5}], {0x8100, 0x9, 0x6, 0x1}}], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x3ff, 0x77, 0x65, 0x1, 0x1, 0x88, 0x0, @rand_addr=0x100000000, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ssrr={0x89, 0xf, 0x0, [@multicast2, @dev={0xac, 0x14, 0x14, 0x29}, @loopback]}, @noop, @noop]}}, @igmp={0x14, 0x0, 0x0, @local, "181f2bec3812472793f821ea091fdf21663080c699e6ea941068d6e57a2ceb9b8498039376305246b8db433d589729df7640b0a2c9e0daeee6dead398ab2b21d988b07bde33c34"}}}}}, &(0x7f0000000080)={0x1, 0x4, [0xf01, 0x7a5, 0x2c3, 0x505]}) mount(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x80000, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x248000, 0x20) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000000c0), 0x1) setsockopt$inet6_buf(r1, 0x29, 0x7e, &(0x7f0000000140)="1bf94950735f83306fe4195e7336013cc6ba44dcc199d446462555425f1bb378048cc7618b43d8c37cf4e6e65f72165eaf510844cff59fe4692f5e9cb81095528447fb366860190209255e469e129bd34dc7b732adb0e8ba960cd176c361fab7e1e9bd8e51c661e6354fc70b5d6df793659b4b0700c4dba2e4346341f5bffd306ac4b5b50d7e0c1d4c8eefa0f090a796fd017e175fddf90d7c8ce32688200e65894fa6ea2b58eb49d0cb87f968b269ab24f3bf4f4c5259e0f97c", 0xba) 20:04:17 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x4, 0x0, 0x80000001, 0x80000001}, 0x8) [ 365.307859] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 365.316802] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 365.329310] Error parsing options; rc = [-22] 20:04:17 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=""/87, 0x57) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="c10e85f98ad0e679055e19f25b0d", 0x0, 0x1f36}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) [ 365.451067] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 365.460029] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 365.472579] Error parsing options; rc = [-22] 20:04:17 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) [ 365.742708] QAT: Invalid ioctl [ 365.783659] QAT: Invalid ioctl 20:04:18 executing program 4: clone(0x1000000000011, &(0x7f0000000180), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x20000000000031, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x2001000004, 0x0) 20:04:18 executing program 2: lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xf) 20:04:18 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x2000, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000440)='/dev/dri/card#\x00', 0xfffffffffffffffb, 0x2000) tee(r0, r1, 0x9, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000300)) r3 = msgget$private(0x0, 0x400) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000200)=""/234) 20:04:18 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fc) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0xffffffc5) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x4) 20:04:18 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2405, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x27) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) [ 366.057354] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 366.066325] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 366.078987] Error parsing options; rc = [-22] 20:04:18 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x7, 0x100, 0x3, 0x100000000, 0x6, 0x20000000000, 0x1, 0x5, 0x6, 0x9}, 0xb) 20:04:18 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x7d) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:18 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000000000000f939407fba5510992e020000000000000077fa6f835d3921b7d0343d0a9ab0cf93"]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 366.256051] QAT: Invalid ioctl 20:04:18 executing program 1: r0 = shmget(0x0, 0x3000, 0xc0, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 366.284728] QAT: Invalid ioctl 20:04:18 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 366.402570] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 366.411428] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 366.424059] Error parsing options; rc = [-22] 20:04:18 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000040)={0x1, 0x0, [{}]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, 0x0) [ 366.489031] Error parsing options; rc = [-22] [ 366.590553] QAT: Invalid ioctl 20:04:18 executing program 4: 20:04:18 executing program 2: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000000c0)={0x80000000, 0x80000000, 0x2, 0x4, 0xbe95}) 20:04:18 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x800000000000000) r1 = accept4(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @empty}, &(0x7f0000000140)=0x80, 0x80000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) r5 = getegid() r6 = getegid() fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x2}, [{0x2, 0x5, r2}, {0x2, 0x0, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x1, r5}, {0x8, 0x4, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}, {0x8, 0x5, r9}, {0x8, 0x6, r10}], {0x10, 0x5}, {0x20, 0x1}}, 0x6c, 0x1) 20:04:18 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:18 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x2, 0x2, 0x9, 0xffffffffffffc425}, {0x400, 0x7, 0x6, 0xe51a}, {0x2, 0x8, 0x81, 0x9}]}, 0x10) ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 20:04:18 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 366.895880] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 366.904906] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 366.917418] Error parsing options; rc = [-22] [ 366.927702] QAT: Invalid ioctl [ 366.965268] QAT: Invalid ioctl 20:04:19 executing program 4: 20:04:19 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x8) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x40}}, 0x40) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000140)=""/154) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 367.030177] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 367.039129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 367.053181] Error parsing options; rc = [-22] 20:04:19 executing program 0: 20:04:19 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:19 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x210000) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x400, 0x8, 0x4, 0x2000000, {0x0, 0x2710}, {0x4, 0x8, 0x100000001, 0x80, 0x1ff, 0x8, "f59deed4"}, 0x8, 0x3, @fd=0xffffffffffffff9c, 0x4}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='adfs\x00', 0x0, 0x0) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f00000001c0)={0x4, 0x1}) [ 367.294319] Error parsing options; rc = [-22] 20:04:19 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:19 executing program 4: 20:04:19 executing program 0: setxattr$trusted_overlay_nlink(0x0, &(0x7f0000000040)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x1) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r3 = add_key(0x0, &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, 0x0) ioctl$VT_GETMODE(r0, 0x5601, 0x0) setpgid(0x0, r2) 20:04:19 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000200)={0xfffffffffffffff7, {{0x2, 0x4e20, @loopback}}}, 0x88) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) bind$unix(r0, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 367.573338] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 367.582353] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 367.594818] Error parsing options; rc = [-22] 20:04:19 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind(r0, &(0x7f0000000200)=@xdp={0x2c, 0x1, r1, 0x33}, 0x80) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 367.625552] Error parsing options; rc = [-22] 20:04:19 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 367.691386] Error parsing options; rc = [-22] 20:04:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340)='U', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000002c0)='\x009', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280)="eb", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0)='+', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000100)="3fde71fcd7d70314561ebd0e2a87e8737debc22e338d61c4826a2cd07167c0ecf0e06e67efde", 0x0, 0x2}, 0x20) 20:04:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x9, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:19 executing program 0: 20:04:20 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f00000040c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004000)=[{{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f0000001840)=[{&(0x7f00000003c0)=""/70, 0x46}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/209, 0xd1}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/76, 0x4c}, {&(0x7f00000016c0)=""/99, 0x63}, {&(0x7f0000001740)=""/223, 0xdf}], 0x7, &(0x7f00000018c0)=""/179, 0xb3}, 0x9116}, {{0x0, 0x0, &(0x7f0000003d80)=[{&(0x7f0000001980)=""/219, 0xdb}, {&(0x7f0000001a80)=""/76, 0x4c}, {&(0x7f0000001b00)=""/86, 0x56}, {&(0x7f0000001b80)=""/85, 0x55}, {&(0x7f0000001c00)=""/247, 0xf7}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/124, 0x7c}], 0x8, &(0x7f0000003e00)=""/74, 0x4a}, 0x7fffffff}, {{&(0x7f0000003e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003f00)=""/5, 0x5}, {&(0x7f0000003f40)=""/14, 0xe}], 0x2, &(0x7f0000003fc0)=""/33, 0x21}, 0x4}], 0x3, 0x1, &(0x7f0000004100)={r3, r4+30000000}) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000004140)={@local, @multicast1, 0x0}, &(0x7f0000004180)=0xc) recvmsg(r0, &(0x7f0000005940)={&(0x7f0000005740)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005840)=[{&(0x7f00000057c0)=""/62, 0x3e}, {&(0x7f0000005800)=""/56, 0x38}], 0x2, &(0x7f0000005880)=""/134, 0x86}, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005980)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept4$packet(r0, &(0x7f0000005bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005c00)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005c40)={'team0\x00', 0x0}) accept4$packet(r0, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005cc0)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005dc0)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000005ec0)=0xe8) getsockname$packet(r0, &(0x7f0000005fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006000)=0x14) getpeername$packet(r0, &(0x7f0000006080)={0x11, 0x0, 0x0}, &(0x7f00000060c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006100)={'team0\x00', 0x0}) recvmsg$kcm(r0, &(0x7f0000006680)={&(0x7f0000006140)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006500)=[{&(0x7f00000061c0)=""/129, 0x81}, {&(0x7f0000006280)=""/4, 0x4}, {&(0x7f00000062c0)=""/208, 0xd0}, {&(0x7f00000063c0)=""/114, 0x72}, {&(0x7f0000006440)=""/145, 0x91}], 0x5, &(0x7f0000006580)=""/217, 0xd9}, 0x2000) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000066c0)={@multicast2, @dev, 0x0}, &(0x7f0000006700)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000006bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000006b80)={&(0x7f0000006740)=ANY=[@ANYBLOB="28040000", @ANYRES16=r1, @ANYBLOB="01002bbd7000fddbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="8000020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004004000000008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000400000008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="ec00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000300000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000008000100", @ANYRES32=r11, @ANYBLOB="4402020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004000400ff01ff070000ffff090100000000000002008100000001003f08bf030000a300ff00950f000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000a8e4a6420004000400", @ANYRES32=r15, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r16, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17], 0x428}, 0x1, 0x0, 0x0, 0x10}, 0x40) 20:04:20 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0/file0\x00', 0x129) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x1ff, 0x0, 0x10000, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x3f68, r1, 0x10001, 0xd18}) set_tid_address(&(0x7f0000000180)) 20:04:20 executing program 0: [ 368.107454] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 368.116529] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 368.129015] Error parsing options; rc = [-22] 20:04:20 executing program 4: [ 368.155998] Error parsing options; rc = [-22] [ 368.196881] Error parsing options; rc = [-22] 20:04:20 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x190) creat(&(0x7f0000000240)='./file0\x00', 0x4000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:20 executing program 0: 20:04:20 executing program 4: 20:04:20 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='ecryptfs\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 368.583128] Error parsing options; rc = [-22] [ 368.629047] Error parsing options; rc = [-22] 20:04:22 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='efivarfs\x00', 0x0, &(0x7f0000000340)='cgroupusersystemwlan1\x00') 20:04:22 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x2}, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000500)={0x1, @win={{0x5, 0xafe3, 0x7, 0x6}, 0xd, 0x9, &(0x7f00000003c0)={{0xbd3, 0x6, 0x1, 0xd93}, &(0x7f0000000380)={{0x1, 0x4, 0xff}, &(0x7f0000000080)={{0x800, 0x1, 0xbbef, 0x1}}}}, 0x1, &(0x7f0000000400)="3bf39ef46ae11a168c6a87b63a41bc8c2d1bfe6cccb4b64ee7206c9cf036ecf19e4a0378533c6a883423d4ace8bc5d9442490e87c8a19e9d0fd18951bbb9503230b353c2ee477a60bd4ed5da957d5879b3c285cd065f8d4479ed51e18141d632dfd1b19676550ef1092a8e2bafc248c3aeda526016b185463a2ca5696d8b733266dabf2dd95d04075842276fc388df53149decb7d1130e221a05def05a0a89249f4a0ad307dc2e8e6408aecfe4a11ea88135d9188a9f1dd6e374d329eac0d912b7835a49cb39caafcb7eaadc7722fab2c8e037cd51161202234f2602c03fb115c749bb33c15a2e00e95858d6d1fb31a2facd632ac8ae04"}}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:22 executing program 0: 20:04:22 executing program 4: 20:04:22 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 370.877934] Error parsing options; rc = [-22] 20:04:23 executing program 4: 20:04:23 executing program 0: 20:04:23 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) accept$alg(r0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x5, 0x22603) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000340)={0x2, 0x101, 0x40, &(0x7f0000000040)="d9f07cd04341d8eeaf44bd8980529ff54ee07a0bb03595f3b467f301d530fcf5e263fe9747b51e57758a95a59d87f311ad219348be9d9612ce1df1953c105ad1"}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000400)=r0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) connect$packet(r0, &(0x7f0000000300)={0x11, 0xff, r2, 0x1, 0x23}, 0x14) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:23 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000000c0)=0x8) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x2, r3}, {0x2, 0x1, r4}], {0x4, 0x7}, [], {0x10, 0x1}, {0x20, 0x1}}, 0x3c, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x8, 0x3f, 0x75b, 0x4}, &(0x7f00000001c0)=0x98) 20:04:23 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x6b, 0x1, 0x8, "4e5efdc528a272584608455fd151fe9d", "97fe515d58c058bb6be5519e094c247f57c0855b7c4cfdda6821046c891d5c7c6190c9a5772bce752e3cc14a80d516e80bff7b96d109c69a7cdd6b2206fcb2efb9e37283caffc81c8a888b4a1400b11c707adbb7e56d"}, 0x6b, 0x2) [ 371.161440] Error parsing options; rc = [-22] 20:04:23 executing program 4: [ 371.231620] Error parsing options; rc = [-22] [ 371.301744] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 371.310587] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 371.323208] Error parsing options; rc = [-22] [ 371.346009] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 371.354987] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 371.367549] Error parsing options; rc = [-22] 20:04:25 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:25 executing program 0: 20:04:25 executing program 4: 20:04:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/llc\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)={@broadcast, @dev={0xac, 0x14, 0x14, 0x23}, 0x1, 0x7, [@multicast2, @broadcast, @multicast1, @multicast2, @multicast2, @rand_addr=0x8, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x2c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x20) 20:04:25 executing program 1: inotify_init1(0x80800) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:25 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x400000000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecry\xe9\xf9\xa7\x83F]\xd43\x92\xf9\xdb{<&M\xa4=7\x9b\x04\xfa\xee\x84oc\'b\xd0\xcd\xf6\x8c\t\xfa\x9e\xae\xe5\xa7\x8fE0x0, 0xffffffffffffffe7, 0x1f}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e24, @broadcast}}, [0x7, 0x1, 0x8, 0x3, 0x4, 0x7, 0xffffffff, 0x0, 0xfc, 0x6, 0x9, 0xd4b5, 0x402c, 0x4000, 0x6]}, &(0x7f00000003c0)=0x100) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:26 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040)="e6e81d846f1a03467ac2c8dfdcd44c96930479c8f86f752498d0a5eaf18c6930a825f84a", 0x24, 0x6, &(0x7f00000000c0)) r1 = msgget(0x2, 0x151) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)=""/197) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000240)=""/109) 20:04:26 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f0000000480)=r1, 0xfffffffffffffd2c) inotify_add_watch(r0, &(0x7f0000000300)='.\x00', 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) prctl$PR_SET_SECUREBITS(0x1c, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f00000000c0)={[], 0x8000, 0x1000000000000, 0xc2, 0x0, 0x80000001, 0x2, 0x0, [], 0xfffffffffffff908}) 20:04:26 executing program 0: [ 374.398302] Error parsing options; rc = [-22] [ 374.453303] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 374.462503] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 374.475043] Error parsing options; rc = [-22] [ 374.504440] Error parsing options; rc = [-22] [ 374.591578] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 374.600684] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 374.613179] Error parsing options; rc = [-22] 20:04:29 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:29 executing program 4: 20:04:29 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/170, &(0x7f0000000040)=0xaa) 20:04:29 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:29 executing program 0: 20:04:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x40200) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f00000000c0)={@remote, @local}, &(0x7f0000000100)=0x8) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x69d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x21, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000200)='veth1\x00', 0x5, 0x5, 0x8}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xbe22, 0x10000) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, r1, 0x0) semget(0x2, 0x2, 0x40) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000006440)={@mcast1, 0x0}, &(0x7f0000006480)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000064c0)={0x0, 0x0}, &(0x7f0000006500)=0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006540)={{{@in6=@mcast1, @in6=@empty, 0x4e22, 0xffffffff, 0x4e20, 0x0, 0x2, 0x80, 0x80, 0x0, r3, r4}, {0x2, 0x7, 0x1, 0xfffffffffffffffd, 0x65, 0x80000001, 0x6, 0x2}, {0x5, 0x3be, 0x100, 0x2}, 0x7, 0x6e6bb2, 0x0, 0x1, 0x2, 0x1}, {{@in6=@empty, 0x4d6, 0x33}, 0x2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3503, 0x2, 0x2, 0x80000000, 0x0, 0x9, 0xcc53}}, 0xe8) creat(&(0x7f0000000000)='./file0\x00', 0xc8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 377.124815] Error parsing options; rc = [-22] 20:04:29 executing program 0: 20:04:29 executing program 4: [ 377.172502] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 377.181345] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 377.194009] Error parsing options; rc = [-22] 20:04:29 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) 20:04:29 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 377.342688] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 377.351548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 377.365076] Error parsing options; rc = [-22] 20:04:29 executing program 0: [ 377.499579] Error parsing options; rc = [-22] 20:04:29 executing program 4: 20:04:32 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:32 executing program 3: chmod(&(0x7f0000000040)='./file0\x00', 0x8) r0 = memfd_create(&(0x7f0000000380)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0xde31, 0x200) prctl$PR_SET_TIMERSLACK(0x1d, 0x101) ioctl$FICLONE(r0, 0x40049409, r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat(r1, &(0x7f0000000880)='./file0\x00', 0x0, 0x181) symlinkat(&(0x7f0000000240)='./file0/file0\x00', r3, &(0x7f0000000900)='./file0/file0\x00') ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="00fb2c0301c5ce35cfd99b37b621e73b4e69a9c3a71efd4429c6a413063c5e152b5f3db99039482555298ec49cbf"], 0x2c, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xa) r4 = geteuid() r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200c}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xf4, r5, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x23}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffff7c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x11}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x35}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x800}, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f00000006c0)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x7, 0x2, {"e0233374355373cae4d3ff5279117c52"}, 0x4, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000007c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000680), r6}}, 0x18) write$P9_RREMOVE(r2, &(0x7f0000000940)={0x7, 0x7b, 0x2}, 0x7) r7 = getgid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000008c0)={r8, r4, r7}, 0xc) 20:04:32 executing program 2: setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x1e, 0x2, 0x8, "e3b8680172a620108b3fc1e1fafeb679", "c78190672633578178"}, 0x1e, 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$NBD_CLEAR_SOCK(r0, 0xab04) keyctl$set_reqkey_keyring(0xe, 0x7) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100800}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="7400000064c322db4942ff952033c89990", @ANYRES16=r1, @ANYBLOB="181a2e749100fb004c000000000473797a310000000000e08b4b0eeac2891e0000000000000000001000000000000000da00000000000000000000000000df376748a0b671000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x48010}, 0x20008800) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000004c0)={0x3, 0x2, 'client1\x00', 0xffffffff80000004, "b6e724ca077d36ba", "3262c12ebd5ed6cb35186f057fb81e2ca00271b49832e493869c67324a150f46", 0x7, 0x9}) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x10) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mISDNtimer\x00', 0x1, 0x0) 20:04:32 executing program 0: 20:04:32 executing program 4: [ 380.185379] Error parsing options; rc = [-22] 20:04:32 executing program 4: 20:04:32 executing program 0: 20:04:32 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20502, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x28) 20:04:32 executing program 1: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x20000000000082) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') mkdir(&(0x7f00000000c0)='./file1\x00', 0x8) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) 20:04:32 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='erofs\x00', 0x200000, &(0x7f0000000240)=')GPL\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:32 executing program 0: 20:04:35 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:35 executing program 4: 20:04:35 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) fanotify_mark(r0, 0xc2, 0x8, r0, &(0x7f0000000040)='./file0\x00') 20:04:35 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0xc3, 0x1, 0x4, "cbb51faea974f7668cfd7070e7afa2dd", "aec228edbc6668aa46a574a5204294f70cd3f1143cff570f560765a3e2283f71c2d9425203be3047372d30e355519d1b2257fa60dcde9b3b53aa987f67ad67bc4a524642569ae5ba40f4d016252fea1379df9120f7828a47f101465ba56a2355043f45c4da800235b664a700db7abb621b7d0fd402a00ff0abd52ab9ea5ec0afbf6fb1cb1eb8211fa791dd5fa496889840cfb2f4961e5045912d3302d75b5b0100f4def9b142a316b0dd42e08a91"}, 0xc3, 0x2) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='rpc_pipefs\x00', 0x0, &(0x7f0000000100)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:35 executing program 0: 20:04:35 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) sysfs$2(0x2, 0x69, &(0x7f0000000200)=""/127) [ 383.299879] Error parsing options; rc = [-22] [ 383.327333] Error parsing options; rc = [-22] 20:04:35 executing program 0: 20:04:35 executing program 4: 20:04:35 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0xfffffffffffffffc, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:35 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:35 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "9b7d888574358e6038eaa508378523e817e3a11d"}, 0x15, 0x3) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 20:04:35 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:35 executing program 0: [ 383.690715] Error parsing options; rc = [-22] 20:04:35 executing program 4: 20:04:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="09b1938e2ff335619f52b8847a930f33a8d2b0933b6fddc2278c2a084e54168ae5797598da04807d9795af4f61da9046280f1056897e0dbd45d6b350357ffe781920ba740f8c28afca09002fff020c1c0b399a20d8d1682ba7545301dfc47ced83b728de3ae8b3cb58003deb67c7fa4a81e2ea41bd3ebf2299796835a6d9", 0x7e}], 0x1, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') mkdir(&(0x7f0000000040)='./file0\x00', 0x68) 20:04:36 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:36 executing program 3: listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/188, 0xbc) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'yam0\x00', {0x2, 0x4e23, @multicast2}}) [ 383.970675] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 383.979861] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 383.992369] Error parsing options; rc = [-22] 20:04:36 executing program 0: 20:04:36 executing program 4: [ 384.107015] Error parsing options; rc = [-22] [ 384.108514] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 384.120535] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 384.133045] Error parsing options; rc = [-22] [ 384.172703] Error parsing options; rc = [-22] 20:04:36 executing program 4: 20:04:36 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x1008, 0x3, "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"}, 0x468301) 20:04:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x3, r0}) 20:04:36 executing program 0: [ 384.556720] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 384.565659] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 384.578340] Error parsing options; rc = [-22] [ 384.631938] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 384.640788] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 384.653249] Error parsing options; rc = [-22] 20:04:38 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:38 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[0x1, 0x5, 0x0, 0x0, 0x100000001]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x1ff, 0x8f, "50a563913828ad6d8fcd2611ee6aed0c8fcd90d9a692ce1af134d25551f8cf71f3990980331857e61bff09c6bbe7e45bf695c929bb1d3e14615aea290d06538efc138f7311dacb6407fff6e39ec4b4b61fbac99e54e58d1f772e44663bc0c4105ccdff1070ac2b3c5e5452d41711556a5897af7041bcd0e7513ec6eee2fbdcbf1f33712c661f47f9710b60ac035172"}) 20:04:38 executing program 0: 20:04:38 executing program 4: 20:04:38 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x4e21, @local}, {0x306, @random="23c89024a246"}, 0x2, {0x2, 0x4e23, @remote}, 'bond_slave_1\x00'}) 20:04:38 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x6374, 0xfffffffffffffff8, 0x0, 0xf, 0x0, 0x4, "7fb8b7cddb0d9f997e6fb7c5885abe4ca5bac65295bf686d79eaa8a7718a3b95cef5d573dc0f629eda015d4e1f5f38dade81b33fcf22d1fb8919a16122095eab", "e4f4b6a40cf7399a1bef64b4b61b68c123ad8560fb73db1b274154eafb4c3b34bb046345363786730973af8939735410b4984f219756a9beafecad90b4b6b1ea", "32e3df652e70750997eedf2f6d880d63b73d9e04b3ea0267c7fdf08456676e16", [0x5]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') chdir(&(0x7f0000000300)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000180)={0xc, {0x9, 0x2, 0x3, 0x8}, {0xfffffffffffffc01, 0x7ff, 0x0, 0x5}, {0x9, 0xffffffffe7707d1e}}) [ 386.755096] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 386.764111] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 386.776687] Error parsing options; rc = [-22] [ 386.790945] Error parsing options; rc = [-22] 20:04:38 executing program 0: 20:04:38 executing program 4: [ 386.832302] Error parsing options; rc = [-22] [ 386.895503] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 386.904574] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 386.917158] Error parsing options; rc = [-22] 20:04:39 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xfffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000003c0)={0x9, "ad5d118ccbcd7fd50d263f054fae7623f7ac95b547ad12e4e522b4054056e7e4", 0x0, 0x4, 0x7, 0x4000, 0x10, 0x8}) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000380)=0x19, 0x4) utime(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)={0x4, 0xffffffffffffff6d}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000200)={0x1000, "2213ec712154234dca8baed675b23975264df4206ff62ef63454fa3594d63429", 0x0, 0x3, 0x0, 0x0, 0x1, 0x6}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000340)={0x1, 0x0, {0x2d, 0x12, 0x4, 0x10, 0x4, 0x0, 0x4, 0xb, 0x1}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x5}, @timestamp, @timestamp, @window={0x3, 0x9, 0x3}, @mss={0x2, 0x1}], 0x5) link(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') 20:04:39 executing program 0: 20:04:39 executing program 4: 20:04:39 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x10) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '%vboxnet0'}, &(0x7f0000000100)=""/25, 0x19) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) [ 387.274517] Error parsing options; rc = [-22] [ 387.324928] Error parsing options; rc = [-22] 20:04:41 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:41 executing program 0: 20:04:41 executing program 4: 20:04:41 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:41 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) open_by_handle_at(r0, &(0x7f0000000200)={0xe2, 0xffff, "6731b058d74645a65a1e8cb96b37f9e49fea39f87285ff1f983a468d1ae7c3eb3c141d03f18e731bacac85ad032fb1c3a7dea49de826d2475d6d88983686d45e3806cbeb0026fd1bc951347271d2298eea25142f710536e24b91d2789a0de13930594606ad317b16a20df8ca7ee2942bf346cf21d647967f61e143b3d548d317f4a102a1e54be96f02cacb887fd74fe115070a1d7d6208cb4e63cc7b4c4710f11f5bc5e9a19e3ff4f97824d14ac4465c0a475e2ff7fe5ec8af8119af88710853b2a7f7e89a69e04dfb5f359b9ba4354218890af0843317e994ac"}, 0x4001) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='numa_maps\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x42, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x7f, @local, 0x81}, @in={0x2, 0x4e24, @empty}}}, 0x118) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000480)=0x3) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x100d}}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x18, &(0x7f0000000940)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303136303030302c757365725f69643d6f00a900ab45682dc699d8e53f819c4f0ec50f5d455ea1a316e99fd4f22919ed7b273272460c7522ab9634eadb56aabf19236d8595da0c6d5bc4557a49ce3e6983919f959e50d30ca8eb2e78ae8f6970077d375954ec8369c5c36aa7659fe8c648135f1594442bd073e67f42b54f3b4a3a9b7127b6868f3564262ea4d4a5c515617bcddac7e177da49ebda526134acf6664e175abf23657670d7b682194b872bad5cd1791eb0b4a9be9d", @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000003,allow_other,blksize=0x0000000000001000,default_permissions,max_read=0x0000000080000000,allow_other,blksize=0x0000000000001600,default_permissions,smackfsfloor=numa_maps\x00,appraise_type=imasig,fscontext=staff_u,seclabel,measure,measure,fsuuid=7e5w\x00f~a-ec4a-281c-v10x0, 0x0}) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r1, r2/1000+10000}}) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 20:04:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 20:04:45 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200281, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000200)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00') 20:04:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) 20:04:45 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0xfc, 0x7, 0x1, {{0xef, '\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl'}, 0x3}}, 0xfc) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') [ 393.017929] Error parsing options; rc = [-22] [ 393.025321] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 393.034302] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.046908] Error parsing options; rc = [-22] [ 393.064714] Error parsing options; rc = [-22] [ 393.097119] kauditd_printk_skb: 3 callbacks suppressed [ 393.097155] audit: type=1326 audit(1552593885.151:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13163 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:45 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 20:04:45 executing program 2: 20:04:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x2000000000001, {{0x5d, 0x3}, 0x595c}}, 0x18) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffe, &(0x7f00000000c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:45 executing program 0: 20:04:45 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x3) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x0, 0x0, 0x3}, 0xffffffffe0adca9c}}, 0x18) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x840040, &(0x7f00000000c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:45 executing program 0: [ 393.794215] audit: type=1326 audit(1552593885.851:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13163 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:48 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:48 executing program 2: 20:04:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @ioapic={0x3000, 0x1, 0xe676, 0x9, 0x0, [{0x0, 0x0, 0x100, [], 0x4}, {0x1, 0x2, 0xfce3, [], 0x1}, {0x6d1, 0x5, 0x7, [], 0x10000}, {0x1, 0x0, 0x200, [], 0x800}, {0x5fa, 0x2, 0x5, [], 0xffffffffffffffc0}, {0x4, 0x2, 0x7fff, [], 0x28859de1}, {0x3d2, 0xfffffffffffffff9, 0x8, [], 0x2}, {0x30f3, 0x113, 0x0, [], 0x7}, {0x4, 0x1000, 0x4000000080000, [], 0xfffffffffffffff8}, {0x4, 0x8, 0x81, [], 0x8}, {0x0, 0x100000001, 0x5, [], 0x8}, {0x8, 0x4, 0x5fac}, {0x1, 0x5, 0x4, [], 0xaeba}, {0x2, 0x7fffffff, 0x3, [], 0x2c0}, {0x1f, 0x2488c2, 0xd87f, [], 0x7}, {0x9, 0x40, 0x400, [], 0x7efc}, {0xfffffffffffffff9, 0xb9a, 0x1, [], 0x7}, {0x4, 0x80000001, 0x8, [], 0x3}, {0x1000, 0x1000, 0x1, [], 0x400}, {0x81, 0x4, 0x0, [], 0x401}, {0xd8f, 0x6, 0x6, [], 0xff}, {0x3c16, 0x30000000, 0x7328, [], 0x1}, {0x10001, 0x7b, 0x8, [], 0xfffffffffffff000}, {0x480000, 0xccb8, 0x3ff, [], 0x8}]}}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0xf02, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x4000) 20:04:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x8000, &(0x7f0000000140)='\x00') 20:04:48 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x26200, 0x0) 20:04:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) wait4(0x0, 0x0, 0x0, 0x0) [ 396.113378] audit: type=1326 audit(1552593888.171:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13208 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:48 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfffffd9f) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 20:04:48 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 396.185519] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 396.194447] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.206998] Error parsing options; rc = [-22] 20:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getpgid(0x0) [ 396.284552] gfs2: gfs2 mount does not exist [ 396.308690] gfs2: gfs2 mount does not exist [ 396.320989] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 396.331002] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.343463] Error parsing options; rc = [-22] 20:04:48 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}], [{@smackfsroot={'smackfsroot', 0x3d, 'ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02'}}]}}) [ 396.464548] audit: type=1326 audit(1552593888.521:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13230 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:48 executing program 1: recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002780)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000140)=""/70, 0x46}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/157, 0x9d}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000001440)=""/200, 0xc8}, {&(0x7f0000000280)=""/177, 0xb1}, {&(0x7f0000001540)=""/30, 0x1e}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/209, 0xd1}, {&(0x7f0000002680)}], 0xa}, 0x40) accept4$packet(r0, &(0x7f0000003a80)={0x11, 0x0, 0x0}, &(0x7f0000003ac0)=0x14, 0x80800) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000003b00)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000027c0)=0x10, 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:48 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x402, 0x0) ioctl$int_in(r0, 0x8000008004500f, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x8000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) [ 396.689550] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 396.698609] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.711196] Error parsing options; rc = [-22] [ 396.904726] audit: type=1326 audit(1552593888.951:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13208 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 [ 397.246449] audit: type=1326 audit(1552593889.301:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13230 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:51 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0xfffffd9f) fremovexattr(0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 20:04:51 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x50, r1, 0x1, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x22}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x3, 0x2, 0x6}, 0xfff}}, 0x18) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x1000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='fusectl\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="2571b54eb74e1e35350edd77909766de8f7aa2027b00ca4d1fd9cf1f99153c6ddec78175754476eab9d9008b452f1770820036d41e0a65e298fe4c312266dcd0b8c52f69eb09da280c194204c9e9061a6887e1f00dba39ef1c9ff7a31b1a069370d8332a4955dc67173938cb49e88368fa19dc5132520e139eb15e193cae1c03295d862a1e4d81fd9acd998e4f47b9c3f192f4dff7a2d7", 0x97}], 0x1, 0x0) 20:04:51 executing program 1: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='sysfs\x00', 0x40, &(0x7f0000000140)='ecryptfs\x00') 20:04:51 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:04:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x5}, 0x4) 20:04:51 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$netlink(0x10, 0x3, 0x1f) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b00)={0x0}, &(0x7f0000000b40)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000c80)=0xe8) r7 = getgid() r8 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000e40)=0x0) r12 = geteuid() fstat(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rtc0\x00', 0x40000, 0x0) r18 = getpgrp(0x0) r19 = getuid() lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000002b00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002b40)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000002c40)=0xe8) r23 = getgid() r24 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xfffffffffffffff2) fstat(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = gettid() r28 = getuid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003d00)={{{@in6=@initdev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000003e00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003e40)={0x0, 0x0, 0x0}, &(0x7f0000003e80)=0xc) sendmmsg$unix(r0, &(0x7f0000003f00)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000140)="971b8cd37bedfc78034b2d0f668bebb80e9bf6008822851638fef7baa9e14e4e88854f744f248ce346c250f4f9baa4b12c2a25ea709ea3b440d2271faeaa01d9da46d9f42ee6410d693704a9f4d62c9d6dd095509f02aef492d3cb115f646563fcdf65a6ca97747329611a60f3bffea3650dbe430e014585ca6cfb53fbd2f4e2b629e65ecf231fd0ac799078320d2753424ed3f0c0fe05b891d8944b89f1253b956aa93c9feaf6d8a39ab21151f78512572298089395583d1b012c543051321f85d387062da9f05beb8b74078ded8e1320384771a2a7d7003f522b33", 0xdc}, {&(0x7f0000000040)="6e59561296544a9ba3ed66dcc3057fbc250e3b6902a8b43bef530dac7bf30e0629314755677434dcef5184cd061d72d4", 0x30}, {&(0x7f0000000240)="36968f8fbed709a5efc2e19125b619a6f4afd1d79e9d86a997efdd5598450944727938222c703ef2e5c9bd1c510baac229670e40e5db884092465d93cddc5f50fd15744e22c6275ab0c5eb1d47f9f43f6c5ec7a5746e146fb5ea1f973df5c4487871b407ea2fb3165aea220c519c6147d55803d73ca3c8e0f086de956ebb069d4104cb4cd5506723f98f279940b3c8da974f8d2668ad157f8d5208be844bfa5d6864ff6b163c52adfeed", 0xaa}, {&(0x7f0000000440)="693b8d5160579d4730323acad2977985035d4cd7ec7ee68da69c52509f33bff8e8b29bb93c011feec2953217b52d2b86f0d14e2bf5be2523e8e71acd1dd3a83a16ee30bbbb2832c0866c2b34ccc758300c3a344c94830cc54f1d414507402ccd5f20af2e8100d7b258f76957a6afefaa8142bd55102a53271bd74309bc5b7ae2c436b01adfe6e45611e5cc5ed53ed6928a2c65f4f03ed2b300767be57252617065f7ec24790370c62611556a1651d7d55594eb40f4814cbb", 0xb8}, {&(0x7f0000000300)="2a5ecb6de5c57b14bcc896", 0xb}, {&(0x7f0000000500)="f2030a54a5c6bd7dc6863245f7a78b7d75f0009e30e06f4902e09270eb0c593f876ccced655437ae835d2a37513c1afb80", 0x31}, {&(0x7f0000000540)="b76e22812a600333fc74df409d6c0df2acd2911e76f9d060629c23119d2d8dc6a58b5c3b2c44aaa60f9db739202dcb82ac5a123b37858c7a3a07d7809b297ea1a653671b5a7b8bcbe0b4fdc6839a2b1f1459ba913987394e518170db88997f641df977b6dfc23b7a3d7468b0da9248d3f5ce40ee976820d029d7d7f2ab239c821adf5e03d85453aa5bc5f61581b4070e3c189ff0ff9fb2c39422d4a91e924851e445ffc3d281cc69241bc20485448202e5263ca5102d82b308c247d0cb01184ca8768deefc899b12cb1fe9425604fa07b364b3ef09ed8df5ebc2b12a23d8cdc771f7d16840f0ee4085dc8214bd", 0xed}, {&(0x7f0000000640)="32febcce9900f606bf0dd3819a3731b80aac4d2beef0bcf1dcc5aa2f6a35cbaf85f464e7c9a3d1b83be7a49357f85730fffd6ef2664b51d4379f40ecf28db46b5c134763d86e4975f2e5ed1f5d19bcf21ced0ddb15ced519a0a2b5edff", 0x5d}, {&(0x7f00000006c0)="602b9e6178c3e08a37f7f04f748187ff0dcdc2f61e8be891eb98b1a216526c17dea2fdd502b6aeb960cb1b04032b317b92edb7f28951a422ef179a6c25c2d8caada0d03052034a11cf7eaede304fd1dbb7762e8e21bb5bdbf554a941d4535e0faa14513af81f165076ea6bdf45cb4bc22fb2865d543eaf828abb1b3e3923a7c73b52f8cfac519a", 0x87}, {&(0x7f0000000780)="3bc1855fc156819528e9a024cd74d941d396f781ad0b9e0481fecd34e02d1338dcf890a37b89bfa263b3bbbe79f9768534e4d7044e838fe002e2172ee43e3e9871183b9594961d6ab9dffc856b68f926189697614cfcf7bd7b35789890497bc31cb6dcf22ce44ccc5c4a436ade34824c25748b29072247539c913940062655ba9d35cd901633f582adc9c27cf6ddfe17388ebc827433d29feb38efefeb4a2d0faa4fd0a31912a33add291aad5dbe5618053b31ceadded6a529ee7816cbde29c7983596a3637f1d15bc2bacddcf2bc6cc4531785b6fe635720767165a0aac5c653031da54b77b0922ca30fc349954c5de9a4572", 0xf3}], 0xa, &(0x7f0000000f00)=ANY=[@ANYBLOB="20000000000f22e1c189000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00f5ffff1edd0000000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x140, 0x800}, {&(0x7f0000001040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001280)=[{&(0x7f00000010c0)="63234fa344376255eec1c9cbe3803fbd4d2f6c81deb4985e122ac3abbb7734ee8c670722b71cb9b3005b7db3f76826f3feecf6450e084684476b961e06f7cde7abedf91fe0e29e70a308312e49622a706a98fef0f4ced3883aa0546378caa8d46f11ca743a3a380c486925749db0a7e4e32eddb540efbf45864f7da6a2d8c07295ea14efb3b5822d88d6d51336599cb290c0fd3ed7fd8f", 0x97}, {&(0x7f0000001180)="8c4af2ed7a4f0678a6a499ea6027df8c1ede23b9fae799fe5497fe4148bd1c70c8c275c7f2f00793eb4f02f7697d3a9d100147bc55b5c433e824763aa5c4fa4072f2d17896b96633707b5e19259e00305d06e13867fbd7fb2d58dc3941f0d310aa30ab760bea158a3fe60524d78f09695b418235e1217698a59cc9b8c38c5c10081c6775b97fc37485261f14822875452046588539b1e46a661e5b45d83b27332d1c9f305716de481905ef5dd8e99d590fd0fc30127a44", 0xb7}, {&(0x7f0000001240)="241c146c1e82dfd65838db413c49c2c58929", 0x12}], 0x3, &(0x7f0000001480)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r17]}, @rights={0x18, 0x1, 0x1, [r0]}], 0xa8, 0x20000000}, {&(0x7f0000001540)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000015c0)="698890adc1668ac9468c8e0cdcc18c64347c239b4d0c4abb9e932746efa67a76219415f13a8fc0cfe448f91691985626365b3b482b2d61a405f1762e26d8a918a8a61a91047355679d71c32cb03dbfdfe3ebdf684c64dc797f1a9214dbfb6a8864806e6edf9e9bf1f6afb1a660851128801b68106d79b1cef1cce6162e09c9eacbecee9b646faff1b598d9013288008b3a5df8127ffa6eb3c8769d940d884a8671022ee84dc25797f52870a8caa179218877a0af6579e0549103ecabbe8fb4731fb3f0f8e29500a3f8c4eee4d69a4b2cf61080932160973eba80e2050990d5286acb19fcf8b1a7dfc589aabf5a0e2ebf27", 0xf1}, {&(0x7f00000016c0)}, {&(0x7f0000001700)="4896818c15703d3ce562a857bc5199f10c31267cacb0d7f14236f0d70d54633e4b3cdc77a2fc90760f91bc53f8ae8466e66e2f532585c7a30a99af4ca23c2c7d3b1feac09fba2a82b74d15e85a264fe65b8c9ef0cbc62519f2d5c416e253793a4858a405ae7bb235285c1e88ef6a9421322f444e7b3952350f4d5ec0e160b01632aa5de32222bf9e36c6804bc5174eb218cac9c8146e0b420adb9ffd98cb10e6badbca2319e737add71a43c65454022f4fd53f0f4330d6400d12cd133604b5381017b99df5cfeab5fc49fdbdc0f6bdfe1906766d53c919d48daf47e61e1582c657b9d70d08e9c5f82315946a8f631e90", 0xf0}, {&(0x7f0000001800)="ea26182dace995894df8d350e9822001d26c84e33893351354c386d47a67cd3a1c64ad29a9ef7aded8f554ce9fb70e1fb708ef9549bb5733f330adc536134048c62895878a9e1f5d86bb3e62d986f92f986d84716503706301abc8dcef8fb66ae6c4a26780e3a5e4f2e49a8b9b29a95c9986ce4916837a6572d848de4280d5e6b0e270081769a580b9d6fcb44fbfc6578b3d21b3c857a46350fb702180fa7ba47375bb79e5d59202c876f379f3b80941f8efec1724ebb1f530010b2177832c9ff6d357a71791c3faac13b9317caf696854ea3f9a5fa48d813cf2d5a0a72fc0c95ffe7be0133517b20e2a3aa78cf0e6ec8c9c5c9203a0799de24b8dc4747b", 0xfe}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000002900)="d095b72415789ba1ef53cc8bad97dfdc5e9798c0e173f8ee9a7a2656109e97e4e3816cee3b7489254ef22c1f", 0x2c}, {&(0x7f0000002940)="1b1a1d10b7fa585a9fe802fbef0e960af11f7d5d0544ac2caff26c1e60b8f93bd647d0cfc977bc971a291d9c0133bcd7ff09be1a74e7d537f3de0c947cea2caa357b3c81b30e80d2d3275cedd99b13b6ab42e3bb9ef368fb76e90a04360bb4fecf2a6ff505625ab44f938246cb6909ecc6d33e3fbd3c03d3", 0x78}], 0x7, &(0x7f0000002f00)=[@cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r27, r28, r29}], 0xa0, 0x80}, {&(0x7f0000002fc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000003040)="178e427f2539d88a6d46e98cd2fc12991dd90a8aa01b7ba24fc82129b55be4470f97d74745988613f9eee5088fb8f03bf4425cb8191d311f76a2c535e4a4997c7a045c53a5496f81a9495ad317c293d872409f0728aa5b333b889bc82551621b56d46c", 0x63}, {&(0x7f00000030c0)="2e285bceaebc673afd6413049d65fc1ea6b1c81d01acac2eae9a5e57b14055af295916cd56f0ed4d911ca594558b684ee9f900a6b43ac6597fb7ad68beee60800ea76a8bd7861143e631228d48bcdeeb4fbb471c9681373b1246c0f88267b59943c6adde329e6a56c751a79a792272b2d77098437da3a58d05092d7a7f360c717ae25d55217fa2d011fe7a61f7f77a5e2cb86d70b2266d26f84b473456e07bc5123790f1d3a70b0fabd2726a8d8b5c8b972ba2cabce48ee67d", 0xb9}, {&(0x7f0000003180)="bcac0835452069d43ee45685f09b6b241073e935ec529fa785c4e4ed5089fcd6b655a7b398577686405c19c725056bb579e579f43b9ca0d6b6d2ef31e0a4", 0x3e}, {&(0x7f00000031c0)="f9a710ad5722491fa6ba45cfbf219a819883fa264c8914c8ea92af0bcd2e8bc0357f253b42b2fcdad9acb6ecc80e462ce93433bbbed500f90026698a13d0b415275f90aad6d39bba6ae6093d3b56a0d1b965498a12dd7540d5553bb2dc3684e8fd0b716e9587b12683470a7a5104fcfc569658d90aa0c39e9bc42ef428c8acb18d28f84325979f1e778831155ae1c46e0fd7f1c6c16b5032", 0x98}, {&(0x7f0000003280)="39b599ca12deedc1f695715c101263178bbd5dab1427fb69fe1bc4985970a58688f927f8b3e2303fb531da3a7391537f8472a110880c7b60e2c03d45ea4f35d0f150e97c5a5e32e23f719866f5717676bcbdd87ae579d8a930c68f6248f642102b3c94ad359e1e527ea9e3896388cf02cb", 0x71}, {&(0x7f0000003300)="f7391522b2fd204373d4029e8dde57f9e2c7300a0e1f3b6e1c57a282eb000f8b44d953b145b2e47732be7d453267cd6a9ad232a4b465072fd410c3b941fc536fbb3dd2bac3e55e6f64e0bb4925930fc274d9739372e6e18c31a71052a0c6e0d4eae51bb12236b3895ed2b1f5a5d9a8b63d5105c0b1efd8f7b48ce8564b99bd1d371adb11f243cb4bdae5d008e9c2c39fb3ce90e599314c42d7", 0x99}, {&(0x7f00000033c0)="a25c43e186f0ca", 0x7}, {&(0x7f0000003400)="b208de484e765d4cb6e012cac03e30acfaf636c3c76cd73094a11b269408af4e7557de191f5988b1ed2046947df54340155fc48c1f46cf6bb1e073d4bd5f", 0x3e}, {&(0x7f0000003440)="4a8d62976fc203f12f5b603feae1c0b7630a5306eee29da72138912ab67e21739f6ef26e4ce76d3b3945006f5b421cd25e28c95af33af903686ccbfc1d5cadc7c1330145f20ce7d6c6e0eb8deb09bb3825d44b86a34a9d1d464f13c66e40553cbd02c342a35ed16aec69624e8011e62f7e151e258b08462e915af8d499e0fbfaa976c4561c20ce51a1096a0a57f3d4338e620a889ebeb31fd59f7184c17e87efd1f8daf672691b4dd24597aa85e8c5de86b5c0ef0e433f63945918181bf876a78c182d7e47e4d9e02cdf916139d304efd88b2653c8c86248b236a8229a49d06f9992", 0xe2}, {&(0x7f0000003540)="959fdd452e431ed82d47ed94ce664a34b46a765b301d8544b6ae9047b0e5fd59fb6836c3bf6195b3f50d0af25df07a232c20ae065656ca3d06a55811d4afd98ee709965b0469d1dfe8585ce731c271f3be897ec446c060521b8062bcad5d9a4c4323755dc79fae3c8ff513bc32aa7801b0e562bb3fb895bdb1981d801c175bb1dfdf4b53e56e66451724df9f46d1c50ea1db6b62257f84007d3129a25218bdb36a603f11588b02e2b91b6a16011846411c2f59967b5d1b4f09d84c", 0xbb}], 0xa, 0x0, 0x0, 0x20000000}, {&(0x7f00000036c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000037c0)=[{&(0x7f0000003740)="bd8a091018516e6b46344266710914a25201d76eccab8b01da02d93429801f0dc5adca11fa42846f868d4dab3c1cf8a2711886043c68d48921c824267a513e5553bd145f0955101bf992c77a9f6e34f777092929c1031e7603f1688b45eda0b53f4abcb48a9e12f1a715e83bab67d8", 0x6f}], 0x1, 0x0, 0x0, 0x8000}, {&(0x7f0000003800)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003880)="2d5daf3a00501bfaa4aca9c558c3b6a39231e02648cda36ab7f504e93184fe49ea7140a01eca193b04a114bd1c7ea3767d69fc27d422053e4e860084e41025e4668bc44d91b41ead7cdd15b06295dac71d4f90526cac0bf7ac6dc8acdd55a85f9080dd9e18460b5329f3f63a820848240b42fe20b0d2839b5823d26dcd6e40578f", 0x81}, {&(0x7f0000003940)="86255ff209daa9f46b5e9863549bc54a618cfc125bd0e45bd042668c86fb84799d8b46a0ed5f66b7341b523658a214f05834dadaabc146b7f889fde65c79f3c0fe1cedbb59a32603ab098f3dd6fa7f488769aeb1735b0c634242dcfc951d8f0a950a8dd279966b294d15c37116e180a00e8e742f3ab8953869f3b1deca599a2e8ac857b2519cc1d9f69f719ec81bf17ea04b85cf641a07dae3de086d522379900c46269fd3eeb9c34bc737f356f5639e9199ed465bb2a76a13e6", 0xba}, {&(0x7f0000003a00)="d57ad1d7aeb1ed48e5e104eeb6ef0d3dc273f51002a7dd36faa15b71", 0x1c}, {&(0x7f0000003a40)="477f0c3daf06f84e1a21cb904b8b923754a33c0f489048bb388baf35f317c5fabd28c31a380c83637aa476b7dc34b3587b6f02898b4c3400cd743ccf73f05f16957e3e17621e3f67739be23ce7d2251fa7f1128591e4cd63d047f6e114506b5c0fa50861d0a8efe065ca7bee890ec3246c133cd57c92545d78e4ac371bfd78fb840a3de6b9917d500475337b2feecdded698f7c43415299b9727617c24909933f8a42e2cdd2b8616a0523e9a74d2c83bff937dc0a9dc06ad050fb120e24bb08c975ae26b1e0f7f7d476e44319ce6fd7f70448b04d6fae7dcde1daa6d4ee9d9299b6cdd9e4af8715d295c737882a8e0a5abb8644f6d", 0xf5}, {&(0x7f0000003b40)="68f398639d5f371d6bedfc73462bfc4c89e0bffa1f2867792628a6540a5270b0441e0bfd1449d57ca895445bda61cb4d5d4c49cbb4968e4264b950983d3d4bd2e97a295bc8011819e33fbc933eaaf9b0dde3259e654db77c6625d0aac46d16ebd43c47bf928f31b59f858f2acc9d37f6", 0x70}, {&(0x7f0000003bc0)="78ea5d74769e0dc6b834534348043738485cca655286b0cdc3fbdb855e3722d91895b461cc9649549e73b6a4d821e9d003bd967a54d95a11944f7ab516fbfede969877c7f2d60d948760b80532d8e70a362372b825b4f2537cdc979760512c125d2a7288868617a36ad5ccc1f3d854d1867378e3939c004e210e64cc60724a47f883", 0x82}], 0x6, &(0x7f0000003ec0)=[@cred={0x20, 0x1, 0x2, r30, r31, r32}], 0x20}], 0x6, 0x20000000) 20:04:51 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x20000000000002, &(0x7f00000000c0)={{}, {0x0, r0/1000+10000}}, 0x0) 20:04:51 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x4a) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 399.464276] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 399.473345] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 399.485881] Error parsing options; rc = [-22] 20:04:51 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) unshare(0x40000000) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) [ 399.753696] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 399.762787] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 399.775291] Error parsing options; rc = [-22] 20:04:51 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x18) creat(&(0x7f0000000040)='./file0\x00', 0x4) [ 399.812490] IPVS: ftp: loaded support on port[0] = 21 20:04:52 executing program 4: getrandom(&(0x7f0000000180)=""/61, 0x3d, 0x2) 20:04:54 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:54 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0xfffffffffffffffe, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x80000) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000200)="f43d5797e024b832d4d2b3335ca3e83f9c56b67c2402e20cd679a2c419933d48c67150b07a2703b200889a4573f93ceb3ad79ebbc2cbfe33e816a6fc7a3c07cf8ce1acd366810db03c3ee92102b15b7fb0c69c4def985ce92b9c795b496f085f870c338a68d9a56c985a703a116cc441ef638a828b2eaf657d01489c3af18326bf1713fd1085b1e32702e0d15c4258d506f0e6982ea926ace7faa572bb9a7afb76d9f992cf1ddeb4da75e22464aa6e09aa926c143ba8eb7d49b2131fa5fa84e2ef7489f3530e93bc7861e707155beaa43cd9aa0f0918259aac7bc46ab1c3ad3b172800424d1072a58974bc637f14e0ed93b2f9ba823af8dc638522d7e597748ea9dd1a17fcd7ffbaf91a9b6f959b81bbf52d8da8090accf84f5167ba9f4678e227b851e4c41591409fad66e3a69b2471f6a8ddb763b68ae7f21229be2778f061456dffd3d36ded88d6b2bdeeb8c6878cf21f4ef3fe75d7583c1278ccc3cf2726f7c19b7aa5bec8bd13f1599d0e7c3404ac4654e831cf55308d3785696537aef50bf24772703af3a4804ae46032542ead8474495ffce44a6035e12602b33af0a3708a925e1c48b6290f06d636b299ac11ea8957195e3c2bf2f5fc16cce86fc5b389c73b03c654f5ca5f091c4cdd9c51b0ed115c028bf430cdb443a4c1d90871cdcf9b183796be5d042517a3ee0b790e3ddfcd9006e8c91e9e9f2a706bb8ac6e400899d904f4a06a6e426627f3ff425bcac91b348edc20c11159486c05c846f863c22d99965ddcb246f35c034a650f8cb70cbf58087c0b5a502e673cda98c3f820656281d4c1f9b3e930ac848c2c4e5f1bfafdeda4a5785c71229a0d39ee75cc7bc949b72f17b7a8ab2bf046d56fab0fc37cae3ebf7c88ca9e36b6b672314bc4fa75fcf6cf10348156b8287cf863a223e9ccaaad093e6f6edbba27475e9d3a23bb8f3148b0e00a95869e1f0229b40eb9a06a0cd882f67932e1c688621fa5baf9341e1d13c0f304a9c44d65372838adb1b5171349c73275b973cca8a6563d61c210c7000f6d873dd758cf9515000431dd78beb63347e1bd6b44ffca8a5e8885748417d85f5f24c67ef913824ed41527b618d275ae15addf1db4205585cdee84254a3e530f879c70dd397341508160b2ea343c6d3da2af82775fc2b7c6b50d134ba4df0c02a618eeb0e3c5eacbbbef78b08bd25f1c030fb9d6166f53846923a1dc08f91514ea7ca533568cbd0aa3d47030c2a957f1c039e3b0f8fd93abe61ce88e377cce9203d50ec86a4b9c9a5d0e55bdbba352b45a869a1c7368e2e7a37153036857cc7e80772bf8448d7715ff2525c716dade244626b763d19916ebc5f8dc35b16205867d40be3645d32026709cdabea67a7206448f483437fbd2cf9c5fe7a2bda85f86ba01251a3abeb108d8aa6c0f478510600c51d19d0d39f697c83af5d44d025115509097e77a4bd6003cf835975e0d6ef2be9c4fb973f62a4f3744dbdb40df0d787469a2aa7dbd3ca263693f34125c9b559a7ccd3d917d1702298ad180bacf55a4d3610c879c7665a6d22e1b512a716f12ea6f378c500d355584685db9b825ac6310a47a27187c964783ac7f6ba6242da3f00a3db68d9ef8c2d2e9ccd4f3ef43ee4e9dec2aa35401dd11f5a89f9af6d5d70e0e2f5ff7d2887732200675221d2427755439844c20ec6e14f2d06ffe65457024f9d39d1adf9bb10374f2a0915f910d3cfece638fc2dfec5b7108a0b15fa1c503050b5d6cfb899357bc60d534a371421679119eed5f77cb333e82d16f685668c5297001d561050fa612ce279f78cdc04116e6583c2c3c1f4cd7f4963e5adbd30bc9c278ad03adf5a6f7f269b57c212fe5c3451306d92d5287e4f691f25429d4aaea231577256392dfc52c50fb136c09dcd853250d269218075a674a3e70039c8691cc51876700c42e58a3a06803d1cf37b0ed31a0d35c0a6bab1f758b2dd3c211f0c22e476e02633508d1caaaf933b54061e8772aceee7a2385d30110602ce59dd1144bec5a1ab6ea24404c7fa7f87bf0fdbf1324e19d4466abd19248813928372f2a4ff3a0a55692b5ced96814792fecc92d2a29d8e93e8574a4b44ae851524720aec760226dc50944003f1c80f2a49a11ce76a90995e7a1ac7a1c788757ccc8b1968407cf471a3d8642ea293be6d7e0f022b48f4d760435cbd9e5027d9d14e6f97ab8f153180218280ca5f844e05914caff074cce291e9281b698e4288265bf2ef87c0ed9a8c9b16f86b33951dbe3d6d0045ed3282e3c3d4bd573d50c73785bae76615f04be5a53fc2eb54d8f86532c1d78479c5d673dbd64ef01aed7f6906b87696027cb22934f4687605599a6482cb39a3feb831066cd743ce327464fce310d9f79f441d11704f5058dd165040047a959b1c25200ede506766bbeefbae2eb28890f20593721acc3648ab7f5e54acdb15642cc8ae72903122175fe96b86a3a2a80bac8229bbc27524897a48dd7a0f0334a511b61ff7ebbb1e49b35f25700b3ca70c6483180c808a7229c399caecd200136e3a4f43e5b0c0ef6414f6eac0ad0b48d3c942afe7a79276c6a44938bd913b55c097ad13f747420c8be059a09e35f1f276c03d66181dbf356eb3b556a99dfd0cde6dc86a4db083440f61c8fbaa00d46d1d9bfd938d44e0c7274eba3cdb48f4206b28e9b240b3247926d0f2863921cee96264a4a530e35afcda47ecf06db54b19a703a551da97745d87ab47f6e51324fc911654f16ef2bf9c438f6944f2ca78532ada0875ad8716c3f44fed5028b9114fae018c3172f4589a7de6e8fbef193d8592ae27c64a2cccc39f0b88bb7f63a8fdf9eb0ceee1c31d4ddcb6f324bf8cb22a2aa88b69cbe42fa5459f7d0737472057f37ac3618eaa3fbfe63422d6e47fe72dd94a7e575e674da396b1e73c5e5fc4a512983494bd110dbe85e55c99d98d3fddeb7147d6883ef1ddcb65396e6d3f9c17cbd2ce89748b87460e53ef73ea4f52d95d07599bd022e550fce729221324a7554d5b523a1e2624b1e693102669b902ffb602636dd6d9f28f174f289b8b4ad09faf805a69e3c333eed8bb2f081775c1cf6e2f47468e58fec47b1cd0035c50a4c2da949e31fcf18fef911cc8f62452137ae9d3a938b543b006c9a44690caada1ee691b15fe2add4a0218cd484282ea90a5b973e8001d494348a55b664202978fc3981f5040fb3e9542c8f895ed3e4aad5cfcb22c035bb906db70511be017d056b9c97eb59cea0b3488825bffcd1bb1ecbb6418aad23fef01966bc52fc1059708881feeede0622aad964f16004bd9297538c1eb46a734ee33251e7f40d33d8c354b8a6d9af3a8fd637b580442a36d6064413981f2c6752fa9c1095d896f8f26e65f3de02f662c6aa50f2486b216041348059f9c9f47eaef0598c6ed7dd0d374f1e6b8f8a25b157950b9236087d62cb690a1375ca451a135dfcfcf225bbd4e0978488f9b855f644d8e5d7820737991595d7320a30eebf270359f415a1872f708cf2106d767268da61ad75583d121e9cece1d0742dd56a14f5670e31b53816451d3f30a5e1918e368361d90925bc4074da136c73d613ae87f9c1cee00ef8af053473e7341b39b060b555a5ae9961eaa90238183d1e4631400df38c87fac18863cf19accf05a1dd698798f8d54c11eda332c9b2647a5381d3eee3c91c7c18fbf82277f13ceda286a422c1fdc0194005fffa66fe405d756e7c8a2a91ad51b89fa8dc867cc0cf38160a4ef80052c347def6644cfa9bc377ddd6a0e3bb10bb30075c8c86aadc4315c58f8ad9b7e2377576e1352dd5800df2a9a07571c2e6cdef515c8de6c83f5e618dd387bee23bea645fca0e2c55fe927658249ae7b44915286ae48beaace82ed1d0217322c326180822c09f875237a453e00802522267e1f6c6cca5e7d9d61bcc129e52e2f2c02237af73621322241a4a761e22cb13a7095b824bc008bdb656f5e3c785f3d39a70703dd13ce21122c8a68deb6122efea18a50bc5c7e9cac99c00f306e12e7f610b23ef316d2ab0ea4f0675719d12eeae396c3a66a06b4aa8688a066b271a72537b4ffca5cef14313fd225e1711dac60f7e1bbd0b6a97fee9992c1621c4125050aa2273bd7492c8066df3360724b5b4524ed3a04e7ee64ae97aca9a87b005d51c1579c39eaf18a55f47b663a9c1dbc0acf06a4e3a35edd4ae3048827fd82af2071004c658a1a07fe76cc5b4876f9853bbd1e256ce30020b58f4f53c02758c301f6a756a9f65e4e376dcac7fc17bff919b03254071de0b17dc5c56aa751395892be544c130d6b95ca31b36df709b4fd5187cf71746f8ea0cdb7a108f4f04f94d1adea3711722f313eda4151de62079087521a0e0c9c34d5087943080ee99d67b2cfd3641f8a6985ef89e0714e86eef60359922690c719ed0927bde3cf8d3771b136b7ae115790cdf21bb1711002cf6fb814b2b553019b6265e4cad83146cb7895f7169c4c04382d41c30cb6c231451994a11328643d62061cda74b5cbe9f1c8a00633c76d217304ac53cfb9d886b792151341071e616a1559202ce5a866abf9bdaedf66948a1332e31249ec40caa6ad843bfafaca2de1d604e2082cf02806fea1602afd8bb1b2a9eced0d1cbdde6319ceb5072d2f62610c1268ba23c099a32e2c8117a07769eb48b24cf05f61fe7d67b561a36a14e169ef9ba05a909672e7e8abf7ddcc126734ee89f52d2352937b84363424987fc01cfdb41bf74379009e39f217d436080511585f4db74388341bb3e5d23c303e7df806e79c4b0a667cb60b0826c4996cb2093c2eaddf2fc5fc3e61e256fedc5a21e37c335169ede97f300906cf189fc92122bd8ee05da98e4365ba2a1047c2e8caa0d4c711d23d24d5294b3a56e0163f46d870ab1d31dbcfad08dcbc46d9ea2163e62d9b3504366c5a3decd9da130b640d759b452b460e56c6130cf1af6aa01d4df9f1dc85e3bc0891efaba8266336d2134a623ce41578af4b834c238e9a2fd56a1651418986a587be2bb4db1641311810fcb6f08ddef4bfee45bdfd2335fb43c647262bc6c5185cf4ad9dd8c5ae08e42ef96866580b93178ff81395ca1d3aaf2287ea6dd948fd4aab567d7aed9ade9ece1e546b7ee3e36b2909a7ea347beb53f8b68f2e24a86ea4c18cae724a1e4f4d9a03c238aafa42042b7a0792c7a84908fb62c6f3dfb6c4101581100fdc8e104e8953124674b3385ff11fc75b20cd252bfdf62b26c1f86c931bbb1889fd84675d5240805ea78320c403db2c94dc8d70ed5923e1a868f10158f71eca1363f4eb41c231d8394ca614393bb9e5f19c9f761cff6fdb7010038755224ea8f4083ba6b4557b4bb4d93ca5fd4dab745ccb5ec7644419673cb199d152a114335267560751587ec2b501436f3c4f5040d81c2d6f92723645d71d63876b5bd8035ccc89da7557092a4875a315d2f39231d9d3b07826d5f4fe4a6e84fbcb1e8e9983b0c798fc51cc74d77ae606cbbdb52522820aba40ffca20cd1592a48d0e572628f1d4e3454f4178dc2e841a6d1239421015a43330b7899f72934b80b4ec1425ff6083caa03de9eccc110309578b99c7543474fdd06b87073e3dc83c48fe2b11df3f66d52a4d564578de157090aedfa0eab63db2e55559381ca9b1f9ad8a1ed3536965fa22e685528f7788b6fd9769011112404f0d354e6539a33a9f937944c0a51a2c58973faceecbddb981cabadc68c94bdb2471552a325d8716618b1698e5db3ce19e1e4cb4c4747e8d698e6b8dc08a2c41877b377609f7b937bfb96a2c3a2afb2") getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000001300)=0x4) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001340)='/dev/video1\x00', 0x2, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001200)=""/135, 0x87}], 0x1) 20:04:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:04:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, "5376be24fb42a5fc5e75f1691999646ba187c33f357aace15f6d0b02fe3ca8d60b181596c9247b5d0480014e077df578c072aa237aad942ed054f342a6b3b25985b6898e667bae228c74fc70f9419b67"}, 0xd8) 20:04:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = gettid() sched_getaffinity(r0, 0x8, &(0x7f0000000000)) [ 402.364092] audit: type=1326 audit(1552593894.421:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13317 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000340)="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", 0x5a1, 0x8000, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:04:54 executing program 1: r0 = semget$private(0x0, 0x3, 0x80) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000040)=""/49) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:54 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000001200)=""/4096, &(0x7f0000000040)=0x7f3) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:54 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:54 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x0, 0x2}) 20:04:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 402.704243] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 402.713188] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.725808] Error parsing options; rc = [-22] 20:04:55 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000000c0)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:55 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x12) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000200)={0xfff, 0x14, [0x3, 0x1, 0x7, 0x4, 0x1]}) [ 403.000918] hrtimer: interrupt took 296035 ns 20:04:55 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x10000001c) 20:04:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 403.161836] audit: type=1326 audit(1552593895.211:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13317 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:55 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f00000000c0)={0xf000, 0x6000, 0x0, 0x8000, 0x7}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x32, @broadcast, 0x4e24, 0x1, 'wrr\x00', 0x3d, 0x6, 0x7a}, 0x2c) 20:04:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='syz', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 20:04:55 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:04:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000680)={"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"}) [ 403.377441] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 403.386372] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.398956] Error parsing options; rc = [-22] 20:04:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:04:57 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:04:57 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000100)={0x1, 0xff0000000000}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r0, r0}) creat(&(0x7f0000000180)='./file0\x00', 0x10b) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 20:04:57 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x2) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) accept$alg(r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000200)="480ccf38d8b74b470ec9c275cd1ee6e30fc83b", 0x13, 0xfffffffffffffff9) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r1, 0x7, 0x10000}, 0x0, &(0x7f0000000280)="9d55b81bd198e2541f581d5681f31cd4ccd2", &(0x7f00000002c0)=""/171) 20:04:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) 20:04:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:04:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 405.826375] audit: type=1326 audit(1552593897.881:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13403 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 [ 405.860205] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 405.869267] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 405.881751] Error parsing options; rc = [-22] [ 405.909215] audit: type=1326 audit(1552593897.911:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13405 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:04:58 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:04:58 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000200)={0x0, 0x7, 0x2}) readv(r1, &(0x7f00000015c0)=[{&(0x7f00000002c0)=""/199, 0xc7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/195, 0xc3}, {&(0x7f00000014c0)=""/104, 0x68}, {&(0x7f0000001540)=""/82, 0x52}, {&(0x7f0000000080)=""/10, 0xa}], 0x6) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x5, 0x4) mount(0x0, &(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='logfs\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000001640)={0x9, 0x1, 0x1, @random="1d634cafb8d3", 'yam0\x00'}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000240)) [ 405.962454] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 405.971301] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 405.983821] Error parsing options; rc = [-22] 20:04:58 executing program 1: uselib(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "106aed6e5252e254c530ff29"}, 0xd, 0x2) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000440)=ANY=[@ANYBLOB="000100000000000006000000000000000300000000000000050000000000000005000000000000000006070100000000000000000000000000000000000000000000a0246a1eedadb3ba0000000000000000000000000000000400000000000006000000000000000180000000000000030992388b39748f75a3dcbf6ea37f9b30e3ff00000000000000000000000000000000000000000000000000000000000000000000000034e7b2f92c949cd5a431450014000000000000060000000000000001000000000000000007c60800000000000000800000000000000000000000000000000000000000000000000000c300000001000000000081000000000000000200000000000000080108f700000000000000000000000000000000000000000000000000000000000000004f27a2bbc40226b200000000a0000000000000000d000000000000000002f4ff000019d40c5c5d5a703185000000000000000000000000000000000000000000000000000000000000000000004c000000000000002c07000000000000001000000000000000ff0901000000002330b79f41d5f1e5704d11da1cf5e1a130d971acec425a5062b627a8fbcf8ff0f83c88e4cf63128e9314406208141e74c3c13b0277178e6fcce6ab5a81f074359a2e66a1a776262696d7ccce80e9f2df6b54e114cb0d8af024bb3b8f548c12bf118fea230020dd117e9337dc3965306e192a0703b9e6c80ba429a03924c99237c345632197292c5b808cad7004e5ad96c7576b64af01a2f0e36225cd43935cb331d539ad2d163839"]) 20:04:58 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x34, 0x7, 0x6, 0x13, 0x1, 0x5, 0x2, 0x61, 0xffffffffffffffff}}) write$uinput_user_dev(r0, &(0x7f0000000280)={'syz0\x00', {0x6, 0x4, 0x1, 0x10000}, 0x2a, [0x100000001, 0x20, 0x0, 0xffffffffffffffc1, 0x4, 0x2, 0xff0000000, 0x0, 0x2, 0x79587ec3, 0x82, 0xfff, 0x100000001, 0x100000001, 0x33, 0xfffffffffffffffa, 0xffff, 0x5, 0x200, 0x2ee8000000, 0x1, 0x7ff, 0xe, 0x10000, 0x3, 0x2, 0x1, 0x322, 0xbdb, 0x8, 0x3, 0x6, 0xfffffffffffffffe, 0x3, 0x8, 0x1ff, 0xffffffff, 0x1, 0x8, 0x8, 0x8001, 0x3, 0x6, 0x2, 0x100000001, 0xff, 0x4, 0x1, 0x0, 0x6, 0x373, 0x8, 0x5, 0x800, 0x2, 0x100000000, 0x1, 0x5, 0x7fffffff, 0x5, 0x3bc, 0x4, 0x7f, 0xffff], [0x0, 0x1f, 0x6, 0xe84, 0x0, 0xa2, 0x100000001, 0x511, 0x9, 0x400, 0x9, 0x5, 0x6, 0x9, 0x7, 0x2, 0x5, 0x76, 0x7, 0x0, 0x3, 0x2, 0xea50, 0x0, 0x5, 0xffffffffffffffff, 0x26709937, 0x7f, 0x994, 0xf063, 0x8, 0x3ff, 0x1, 0x5, 0xae83, 0x7, 0x9, 0x5, 0x1, 0x1f, 0x7fff, 0x1, 0x19671b55, 0x0, 0xff, 0x8, 0x9, 0x8, 0x4, 0x1000, 0x6, 0x6, 0xb8, 0x100000001, 0x1, 0x800, 0x8, 0xc95b, 0x78b0, 0x0, 0x1ff, 0x6, 0x6, 0x7], [0x200, 0xfff, 0x4, 0x9, 0x10000, 0x1, 0x4, 0xfffffffffffffffe, 0x6, 0x66, 0x1000, 0x9, 0xf124, 0xc6, 0xff, 0x0, 0x756f, 0x3, 0xffffffff, 0x2f, 0x4, 0xc2, 0x6, 0x5, 0x4, 0x80, 0x1, 0x0, 0x101, 0x78f, 0x6, 0x4, 0x4, 0x9, 0x7, 0x800, 0x10001, 0x3, 0x100, 0x7ff, 0x7fff, 0x7, 0x1, 0x8000, 0x4, 0x3, 0x646e, 0x8001, 0x2, 0x8, 0x3, 0x7fffffff, 0x8, 0x7, 0x8, 0xd3a, 0x9, 0x10000, 0x1000, 0x9, 0x8, 0x4, 0x5, 0x5], [0x3, 0x7fffffff, 0xffffffffffffbe4e, 0x4, 0x2, 0x1ff, 0x7, 0x81, 0x4, 0xf6a6, 0x5, 0x8, 0x1ff, 0x2, 0x6, 0x1, 0x7fffffff, 0x4, 0x80000000, 0x9, 0xfffffffffffffffb, 0x1, 0xfff, 0xfff, 0x8, 0x3, 0xa08, 0xfff, 0x80000, 0xd98, 0x0, 0x5, 0x1, 0x5, 0x80, 0xdd6d, 0x7, 0x4, 0x0, 0x7fff, 0xc0000000000000, 0x1, 0x2, 0x80000001, 0x2fe9448b, 0x0, 0x4, 0x8, 0x100000001, 0x8, 0x9cda, 0x7, 0x6, 0x0, 0x6904, 0x8, 0x2, 0x9, 0x7, 0x8000, 0xfffffffffffffc01, 0xfffffffffffffffa, 0x6, 0x20]}, 0x45c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 20:04:58 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 406.266095] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 406.275127] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 406.287637] Error parsing options; rc = [-22] [ 406.397536] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 406.406642] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 406.419158] Error parsing options; rc = [-22] 20:04:58 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 406.609277] audit: type=1326 audit(1552593898.661:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13403 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:00 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:00 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x6, 0x40, 0x1, 0x2]}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) r2 = getgid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1900008, &(0x7f0000000700)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3}}], [{@smackfsfloor={'smackfsfloor'}}, {@uid_gt={'uid>', r3}}, {@uid_eq={'uid', 0x3d, r4}}, {@fowner_lt={'fowner<', r5}}]}}) 20:05:00 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000200)) 20:05:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fstat(0xffffffffffffffff, 0x0) 20:05:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) shutdown(0xffffffffffffffff, 0x0) [ 408.992201] audit: type=1326 audit(1552593901.041:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13455 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 [ 409.048994] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 409.058089] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.070572] Error parsing options; rc = [-22] 20:05:01 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, '*\x13bdevGPL'}], 0xa, "608158e77c4f6590421bc42c0ff0ba437be4b197df36f097c0ad937b9720ef30ac1ec7eeca71d7209c655dfe3bb2c82cda1828d81b34092d3eca364fa76197b998ad4c9642dc18c65d10047da418ab4c201ad63813f6eb665cf229695ef1c31f9dd2faa4d0485f729615d9e4ec2279cfa3ef1b85dcc9cb9804f9237a3f42e796b5d1adeac9bb9a26c05b36dfb576d1fe741328c0210dc9e84b27c94936af7926f5c1f3f082f239a0e261bcf615b73c81fe68ffc62dec0a48e857859cd6"}, 0xd2) [ 409.105375] audit: type=1326 audit(1552593901.071:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13454 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:01 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 409.210448] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 409.219544] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.232075] Error parsing options; rc = [-22] 20:05:01 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:01 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/99, 0x63) 20:05:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:01 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace(0x4207, r0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 409.523472] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 409.532534] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.545450] Error parsing options; rc = [-22] 20:05:01 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) rt_sigaction(0x40, 0x0, 0x0, 0x8, &(0x7f0000000200)) [ 409.788856] audit: type=1326 audit(1552593901.841:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13455 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 [ 409.901313] audit: type=1326 audit(1552593901.911:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13454 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7f, 0x0, [0x40000075]}) 20:05:02 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:05:02 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x7, 0x7, 0xd6a}) [ 409.998641] audit: type=1326 audit(1552593901.991:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13507 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 410.175269] kvm [13515]: vcpu0, guest rIP: 0xfff0 Hyper-V unhandled rdmsr: 0x40000075 [ 410.192903] audit: type=1326 audit(1552593902.251:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13520 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:02 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:02 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x5, 0x4, 0x1}, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:05:02 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:02 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000040)={0x8, 0x5, 0x8, 'queue1\x00', 0x2}) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='pipefs\x00', 0x8000, 0x0) 20:05:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:05:02 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 410.732452] audit: type=1326 audit(1552593902.781:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13507 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:02 executing program 1: sched_rr_get_interval(0x0, &(0x7f0000000700)) 20:05:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:02 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 410.957013] audit: type=1326 audit(1552593903.011:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13520 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 20:05:03 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', '-\x00'}) 20:05:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) times(&(0x7f0000000080)) 20:05:03 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x148) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) 20:05:03 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 20:05:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:03 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:03 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00000001c0)=0x7, 0x4) 20:05:03 executing program 4: socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8}, 0x2c) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x0, 0x2) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:05:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:03 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x410180, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2c0, 0x0) 20:05:03 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:03 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f00000000c0)="07d603b26b42bfbf25bef1a3d54ccb16813b10a619abff072c582fe1afdaf522420634612d30171b8e23d7d8074f794cd4918735e680973323af0c5c860f9d9499cc5fa1765d9595f6abcbe7ca66446c4ba82bb3eff8", 0x56) 20:05:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x4) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:05:04 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:05:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:04 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x1400) 20:05:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="f9ac2fbe19c5b5e92607b4423a3a0d94", 0x10}], 0x1}, 0x6}], 0x1, 0x40000c0) 20:05:04 executing program 1: clock_adjtime(0x0, &(0x7f00000001c0)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 20:05:04 executing program 5: getpgid(0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:05:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 20:05:04 executing program 4: ustat(0x4, &(0x7f0000000240)) 20:05:04 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x2) [ 412.350137] ptrace attach of "/root/syz-executor.5"[13633] was attempted by "/root/syz-executor.5"[13634] 20:05:04 executing program 5: getpgid(0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:05:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) 20:05:04 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000c40)='cpu&5\n\n\n\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x48090) socket$kcm(0xa, 0x0, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(r0, 0x0, 0x20000000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x18, 0x0, 0x0) 20:05:04 executing program 5: getpgid(0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 412.608336] ptrace attach of "/root/syz-executor.5"[13651] was attempted by "/root/syz-executor.5"[13653] 20:05:04 executing program 1: r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="2e0000002b00812de45ae087185082cf0124b0eba06ec24b0141000000000017000040030000000051894dd65b2f484bc83c0341a0c0d684", 0x38}], 0x1}, 0x0) 20:05:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003000)={'veth0_to_bond\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000003040)={@empty, 0x0, r2}) 20:05:04 executing program 3: r0 = creat(&(0x7f0000000300)='./file0/../file0\x00', 0x40) mount(0x0, &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000340)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000000)='y\x00', 0x2, 0x2) r1 = pkey_alloc(0x0, 0x80003) sendto$inet6(r0, &(0x7f0000000280)="c8be974a47da31dd9c72676668efeeeed42a7d31a264354379c9ff43a7fd1fe07f89500c610163a06c01405148988bcd52e32881e2cf8d461c9bacf89154abfa9c2f9f3c12430d1c4f3b554774c611bf869ea505b81d30b493b51ef8205c468e1ef7f3e06929147198f617ffe6", 0x6d, 0xfffffffffffffffe, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, r1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, r1) 20:05:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000200)={0x85, 0x0, [0x0, 0x0, 0x200]}) [ 412.990420] ================================================================== [ 412.997959] BUG: KMSAN: uninit-value in memchr+0xce/0x110 [ 413.004049] CPU: 1 PID: 13677 Comm: syz-executor.1 Not tainted 5.0.0+ #13 [ 413.011332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.022358] Call Trace: [ 413.025731] dump_stack+0x173/0x1d0 [ 413.029761] kmsan_report+0x12e/0x2a0 [ 413.033860] __msan_warning+0x82/0xf0 [ 413.038081] memchr+0xce/0x110 [ 413.041375] tipc_nl_compat_bearer_enable+0x2c4/0x910 [ 413.046643] ? tipc_nl_compat_dumpit+0x820/0x820 [ 413.051441] tipc_nl_compat_doit+0x3aa/0xaf0 [ 413.055899] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 413.061179] tipc_nl_compat_recv+0x1ae7/0x2750 [ 413.065865] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 413.070599] ? tipc_nl_compat_dumpit+0x820/0x820 [ 413.075407] ? tipc_netlink_compat_stop+0x40/0x40 [ 413.080357] genl_rcv_msg+0x185f/0x1a60 [ 413.084543] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 413.089973] netlink_rcv_skb+0x431/0x620 [ 413.094070] ? genl_unbind+0x390/0x390 [ 413.098021] genl_rcv+0x63/0x80 [ 413.101350] netlink_unicast+0xf3e/0x1020 [ 413.105571] netlink_sendmsg+0x127f/0x1300 [ 413.109988] ___sys_sendmsg+0xdb9/0x11b0 [ 413.114099] ? netlink_getsockopt+0x1460/0x1460 [ 413.118858] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 413.124101] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 413.129503] ? __fget_light+0x6e1/0x750 [ 413.133528] ? kmsan_get_shadow_origin_ptr+0x70/0x490 20:05:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 413.138767] __se_sys_sendmsg+0x305/0x460 [ 413.143018] __x64_sys_sendmsg+0x4a/0x70 [ 413.147125] do_syscall_64+0xbc/0xf0 [ 413.150896] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 413.156120] RIP: 0033:0x458079 [ 413.159526] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.178468] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 413.186217] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 413.193515] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 413.200994] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 413.208301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 413.215603] R13: 00000000004c5601 R14: 00000000004d94a8 R15: 00000000ffffffff [ 413.222919] [ 413.224578] Uninit was created at: [ 413.228300] kmsan_internal_poison_shadow+0x92/0x150 [ 413.233612] kmsan_kmalloc+0xa6/0x130 [ 413.237443] kmsan_slab_alloc+0xe/0x10 20:05:05 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ntfs\x00\xf1UY\x00\xd8\xfa\x18{4\xd3\x83\xa9\x99\x8dF\x82\xa5/\x0e\ac\xb7j\xae\x90\xb4=\xeb_7i\x90\xa0\x04P.g\xe5\x1dD\xee\xaf\xfd\xf4\x9cL\xe2\xe1\x81\x8cg\x0e\x89\xa7@T\xab\xcb\x90\x1am\xad\xd5X\xa4\xd1\x10\x8b,\\F\xa1\x0469\x11\xf5\xf6\x1e}\x10\x84\xe6g\xdf\x15RIi\'\x1d\x0fFTI\n\x11;\xb6p\x11A\x1b\xc1%\xdd\xb3\xb6\'\xf5\xd3\xb2\xbf\xb2R\xd8\xe5,B\x99%\xef\x9eN\xb8\xcdq\xcb(\x18\xdc\xcc`\xd2\x034\xd1q]\x1aFc\xeb\xe4\xcd^\xae|u$\xccw\xbf*\x97\x8aT\x9f\xc2\x8bj\xb2\xee\' \xb7\xc9?\x897\xc9J\xaa^\xb3\xe9\x1cd\x94+K\x96\x8e\x8a\xfb?\xad\x8d\x8c5\x15\x01\b\xa7\x89xy\xed{\x12\x15oZ\xa0\xcb\xc7\xe4\xaf\xdd\x98;\xc3owqH\xf98\xffF\x87\xeb\x96\xdei60\xcc\xce\xfdy\x11\xc5\x02', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x1, 0xfffffffffffffeff}, 0xb) [ 413.241369] __kmalloc_node_track_caller+0xe9e/0xff0 [ 413.246503] __alloc_skb+0x309/0xa20 [ 413.250250] netlink_sendmsg+0xb82/0x1300 [ 413.254436] ___sys_sendmsg+0xdb9/0x11b0 [ 413.258536] __se_sys_sendmsg+0x305/0x460 [ 413.262730] __x64_sys_sendmsg+0x4a/0x70 [ 413.266870] do_syscall_64+0xbc/0xf0 [ 413.270648] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 413.275866] ================================================================== [ 413.283244] Disabling lock debugging due to kernel taint [ 413.288719] Kernel panic - not syncing: panic_on_warn set ... [ 413.294641] CPU: 1 PID: 13677 Comm: syz-executor.1 Tainted: G B 5.0.0+ #13 [ 413.303221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.312601] Call Trace: [ 413.315237] dump_stack+0x173/0x1d0 [ 413.318920] panic+0x3d1/0xb01 [ 413.322211] kmsan_report+0x293/0x2a0 [ 413.326061] __msan_warning+0x82/0xf0 [ 413.329913] memchr+0xce/0x110 [ 413.333162] tipc_nl_compat_bearer_enable+0x2c4/0x910 [ 413.338497] ? tipc_nl_compat_dumpit+0x820/0x820 [ 413.343294] tipc_nl_compat_doit+0x3aa/0xaf0 [ 413.347734] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 413.353010] tipc_nl_compat_recv+0x1ae7/0x2750 [ 413.357656] ? tipc_nl_bearer_disable+0xb0/0xb0 [ 413.362535] ? tipc_nl_compat_dumpit+0x820/0x820 [ 413.367344] ? tipc_netlink_compat_stop+0x40/0x40 [ 413.372220] genl_rcv_msg+0x185f/0x1a60 [ 413.376281] ? kmsan_internal_memset_shadow+0x14c/0x430 [ 413.381822] netlink_rcv_skb+0x431/0x620 [ 413.385933] ? genl_unbind+0x390/0x390 20:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x49, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x803, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) [ 413.389893] genl_rcv+0x63/0x80 [ 413.393220] netlink_unicast+0xf3e/0x1020 [ 413.397435] netlink_sendmsg+0x127f/0x1300 [ 413.401751] ___sys_sendmsg+0xdb9/0x11b0 [ 413.405903] ? netlink_getsockopt+0x1460/0x1460 [ 413.410629] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 413.415887] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 413.421283] ? __fget_light+0x6e1/0x750 [ 413.425313] ? kmsan_get_shadow_origin_ptr+0x70/0x490 [ 413.430556] __se_sys_sendmsg+0x305/0x460 [ 413.434823] __x64_sys_sendmsg+0x4a/0x70 [ 413.438926] do_syscall_64+0xbc/0xf0 [ 413.442689] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 413.447911] RIP: 0033:0x458079 [ 413.451156] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.470095] RSP: 002b:00007f228334cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 413.477857] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 413.485158] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 413.492455] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 413.499757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f228334d6d4 [ 413.507086] R13: 00000000004c5601 R14: 00000000004d94a8 R15: 00000000ffffffff [ 413.515534] Kernel Offset: disabled [ 413.519246] Rebooting in 86400 seconds..