990bfaf04aced45192a43adf7de3d8eb98c496e690a6a12efc976bb99cf8a514cb4174dfeb720facf45a03bf20df1304e2387b909d28c30770e81a71ee4587bcb18acd641f3a63b1bb011588e93677ba50547ca38f5c11ae31573d05ec52c9e1c643ebc4838755c0e0805b7780735368df7c986ebbcd0a1b5894f813f41632c528ae97a0b0afe8801c6a2a33eb0b135b9b478fb227eb7476e79b8509ccce2495dc03eed614aff5a07bcc7b2407da0a665c3c7560bb0ffa6bae34c960268f95957e30eb3aadcd9377eec5dec3811288f989371e5d5a1bb8351f4e45a12c140f1159ca520ed00ba51b5d0db4380a7a29eef3e879aba4f8d39f61b1ba078eb4d08f79c4240e93ffcdb8d073f3432eb524717cf94a6195f413770b43a621b5164dc34dba66523b715548e24aeac2f4272945e0a71aa0344dd5d7234daae018c7e1f4cfc0d336a5bc00e24c2b34eb2a2b81756ccb217e272d9bba792884742bdfa782438ac10e15ff76ae2a0bc254daa6a569ab64bf9cc99547393e8fdfb8157ef07f71171607351a7b861fa9d26ed5da687dee616a2be77b3cd05b75cf544b2d3e46b4a3f4fb106bc4a89a99c3e63fa2f4c09a00bd51b10ae3b3e7b1e9789021e3a1595bdf198f25af2d043ab5861f28eaa493fc3c87f54a5c6dea325771558f41db27f35edef19fde419aa6061e74e59c51e6e0be0e4623e7762186d4be62fdc6c6c3c6ad1c2cf87b691428128c1aad97f4634cc08f9d307f1de7f9b76e78e30158d644a761b0e0d9f3f2f8b597e849d6e68459b8ca9d7d7b0bf621ddfae71b58d87d30b8cf9a95debed4f1341bba278c72dd9897cddaed734894e6f515b164651a8157cb7c3cfb8f2e6ea407f267f4bb3056da6151a4b72e733595c56f4d7fcb70bb2034ab0ed9424b83323f00873873d2b7ecb7b3200811fc6e2a2bb0a45d871a08bbc579564b3ce7d1610eb89ab2d78e9b215784573209f60fc79fb0490984bb1485c530e906dbd434332969ebf38ac31de1ca9ad6893107b1fc5eb9ac51fe13532b9ced27ddca78d80466327c68eaed22b7a586ca7606c5ed2fbfd2dca98b6855d5c6d2ae3bc46342acbaec987d5422f34937582c2764299ddd98490bb04306355e877e4d30b86dd3b6bd3870f1dc8a9ff4a1f18d6925f9324899e1abf75b20b0e66888c63288d819ba69e87510fa5cc0e6dc5db87e2540608ef8b2c09ab6f636f1a72bcd98a643cc882a23dae5d5e203dbc9616040628a7214d5cd18a5b808facd2cacd30a0010be1058b98666c5bc17d5d068f8e4b075992e2247c8793d33938b235d7f30fa6e27931545ec25d2e3e52a29eca6e205b61055e52a8832451b196c3f6d83cdd02401c21c6a66fe73301fd4129ed620400a5413fb4ee8dc72fbea33f90fa5520f40b1846b248404cfdc74bd47746854ae15fea768b15fbabfaf8117b2c5e28f2ea15fa115ef75c17a2579132777dd91efbc152c155b1e8c1ebd8ed252c67ddb4478545363a771f664e6f261d67cb8a9ae92903b2812c7c2ccf48dfed393916bbac0af48570ed7484942017ee4aebcbdb8aa6efe78dcd64bd7ce236e03095633d74978831b1360689f1a430771446c4cb69e4d73e6a306ec4ebc36ab4d7a423a44658337acbe06ef9c4c62a387ba1a4e1606329c1b3fc4df4f42ecc0956b0ec7939566cd49dc7f44ec0adc3b58fe4ae2898f451cb8c6ba5130643ba09666e82610646a28584d2f43729be57acde414a24115b9d73169ea226f2e50447f2178287bc34c931472775cbf2ae891f72907c75e6d7add351f820b2ed8884a269dbfa54c8f86fd5ff36437495ac0d8ac09f7ec852e68ff516ef90a8c8eab4e54108eb96623ff3e96014e994f3c9f596d294fbed2f664b30d0ff96009b8029f5efe5a83128697067da48ba2afefac23759e09a82197f05f1b33a852a0af17d84192da8110fb4719db114a2a7edb075ab63f30ca5d751700cc16c3b36ed468ca85be7514aa9a44fabc6794d376deb0d8accae3783386ae1d2958b552004d22cb3c5dfc93262fb0ac748040cf3c1039c92e5de9340804245f700a77364b230c73671696f13646177f4093ac90434430050206b75ab082893fe560e2e74c6d59121790ee24c2ff360280b7d0bfde76f430bd6806289e04f16eeaeceba49052b60bff665a023575f09023213564ef0402a236dd8fb55b6cd56c27d825a94252b700462fd7d80096f08559b85d6c3a9c52cddd2a30ceb3ca37ea7d7eddb19539609859028b5f0f948adfe78114c93c7e754a03c7530899012dffb7dd5f3b4231076ee9582d28498149064e8105128819b24f502f24ca3d36176c74e99d58d7fdad5a11340a8532b1d88ab83e0d289a61364f474e5823b74ac57d1d743a61d7f4cd946c4e26ae38d2cef52bf0910ea411cc0779e90ba54d852e29794acc288d5f7e3cc27481c07d70973f72e06316408e3a7db7c3634d8f73ca0e22477feb4c79ff7d7f5440fbb033ca25fdec407f23bf00d0dc31eef42af58b414255972ff2bb4799abbc3fa9cdf4c24b4b6a31d7bf7c9e0f0a3a48d3918a92b966dd7275c92ab4a9191ef39029b5852db9572b984537cd74e46ad218fdca6e21ff43dabc9a9ae0d1ef5542bc91f05d5c6cf4db9cec8dcb67b160d9d9bc7a61cfef698c43a1b4c8abe7c36caf88200e8df32c0498861309b368e144a256b280aa65378b81a12358065fded88afe3c64bd6db382ec9577570a7360f2ed8ba764d59ab19e16e09cf0854da1c17aaa5e5133119926da518428332275e658462921da38d45341adcbea0d9a446a2ca084aef94ab3754b0384ba347c034eef45948163563693d1eab958b03c3ce81dd7d47e7675b71af6ca0d429c3862dc74726e40e38ea34e50cc568a3d2ec8c50523eb920fd19314c3302c7465e784f037bde2544245b2907cfabbfff525913b8f19a909d34d136db5ca092fc6afc069a422a2f56a8e9c3e6805ae59e505c28f950823dceee9cff3b9239ecbae39f58de0b1936f483958997bef9299cace0b630f4fbd1a94e124de7b57b466ff796788c81c6d9c366618c546eb4d134fe330c955395747da62b293c62e03e1353090ad9c452616e22c4b752816060fa01cfebff27206774c66af7ada9555e7044c90aa6a8bc85e190060d4790b68e3119b5fae3fe98f3f606b3df6db5b600b3a3ccf1ea752c7f113e2d81c5d38a0dedb78768871a11e1f39a1536f2e4310f8900e94509f58ad418beaa028f2fb9791beda6f01154741637cd42fa1e272885df4263a7e029a42151b5aadcba212ae6946ea79456db84511c722b8d8e10b2539a7c898eebaf2d3a72c1acd0eba3fb976af2ae0cc29e7ecd8e356df1b6227068f2626e4c6aa9a93752f4470efe6747b28676a69af4bd573deaab26b2058e87da1940516eef499d266716263aaa7a60c5d801e7cf7a28d918b458d81b11a8eb8b1f7aac549b71f9779471e4d7f3e611ee5d09a834d4f9ca28283d6f7d851b5e16dc100f6c87c7ce3d656b5f2f32c8f5df1cec7b940329a9a46413515096a8c151c4c02dff204f26a39a4a7f6bfa7feb3766b19154a0cd3c7755ed775c4a1d49fbb523c6b54041915f3a9eb3f7a4fcb33a63631c01efafdb9e06325017a7a7713dac434c0c7474e791b9c4137615fae5c95f84880571e97494b5fcedfe8cf26cce2d54a29588b0239b8680dc69ab39a63e575e4a0a6b69f715a1ce335b3c8c77245bf01f7654e8838d05786952fd7b8a143bdfeebf9fa863ca346b259441012e8d11ffc5aa16d2e29c6246d42e82b04d862d735309608ad93a5a384d02964a0c5d30d4078212a55730c19e1bbf9b6b8d8adc7ca3a5a51eafc86530711f6a2cd2cbd2fc61863fee2fbfabbdc7073c7f44fac2bcc740618298778b78b946e4ad0f65d7b3640815c9026c0ac6a0a5be4a7af650f7ccc353b5c4a449c674bbcedabeff8b6fbc6b19f32faa991aa5cadeaa7e43fd850fc5dc61a90625a59561a0f95b247f2d6ec3aaac34bc2f0d3f97a85e35a256613d2f0a0d67de986ca4802cccfb996d2b75737a9e6986d3e37db2d2170059", 0x1000}, {&(0x7f0000002700)="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", 0x1000}, {&(0x7f0000003700)="5bebf23c4afaead784ea3e71498cec51a73d4ddacbbfb1cf50fcb0b3d06766", 0x1f}, {&(0x7f0000003740)="174356b930addc17f53115da50bce49fc12acb741d2724ef7739241a5655102472a849910d0b4f474a442b2ca5104193974ce165b8a8ff3c0cd64f115ff9c2dcddc324972ce5d0f9b1e958274bfb22fe81ab89226f2dbc24e1cad0a2284da47bf5a928b6b09736e35705ccfbc39ae6ef7f1a651880077117c5e95ad6a385b10b256470e56a6cd4b592b67789bf3c388819941b276f5fbe5ef9bf176aa9be8f37cacd75b0295b0ff59df5e77d2b75e4bf55771e2ecadd870b1ff0858ca8d2f0fa", 0xc0}, {&(0x7f0000003800)="814cc97e866086ef42dacb2254e577330520f5b789295efd531eec8534335d9f1b4c725b1994fd502119a3570f54784343dbfd7f9e046fbc837f0f958e6f8c23b93169338ca62592b7f43dc0950af2c42c919a2ecf13f8fa2add7dd34d852bbc6ef9d7727cfd8acfc5c8ec14a43478e02ea421f3978ef55c71c0955d65966d76ba564f263d56c78a7638dce25cf8106ef8673a45dd10c0372888552a330f0dd7662881395558b3926285535ace14cbe3a43b", 0xb2}, {&(0x7f00000038c0)="a81066968a837486f20520ac2fb6ea866b8d424e6518a6c6092c60e55dd5a44eabb8d26568ce119ecd6db720114bdcd0f0f648eae02e8e7eb793d989353bf788a0eb54b4aaccdbf15220c5d08c4a91c54221d54808a292e3e611216bce5a00ac1470331aef85151af13f352edb0850c27c39d7e844e2fb23addda895d9250df1ff7629a46ebf3d25f06bf631bb8921b3b52f45da975d842938a70903d1e5d52be30e", 0xa2}], 0x6, &(0x7f0000003a00)=[{0x48, 0x117, 0x3, "aa0e71b04cd136d66edf2f1d7eb1576fc170e424d806e07f72cb06290c3208d88148c367d3aa3f622c288aa64bd6f0272e"}, {0x38, 0x197, 0x4, "9b88e56cf5ec5edb82f58e4d71b08f7ccde9b79678cc775e5df0b08a84bee7d33c0ca6cb16"}, {0x98, 0x115, 0xcfa8, "892ec38dcb2dce553704df1e608acd93495790264ece70bd9bc099703884a98327df4989216b1e4e8e6ce6184e91bb5a0bb83946d7fd6156af9df779cebaaeb74856f78cd7a20f92628bfaf257270d2fae0d67a48e99674a8294a380a7d419c5f0238ed2f0e81baae6e6f4551a537e939d0f99c10f439541a43bbbeeac8858dc20ea28"}, {0xf0, 0xff, 0x400, "caacc1c8d3aee5bcacf813f384c9fbf7e57f2ed6f1bb528b3612afa891db133c332d7e24c24dc885c710a1c45b005858f64237621b5d91bd33f1fb83df232e5b9da7ec647b5a38d4136533094f7905b8ba7a181a4a7bcd00c96f3b5f4296d5cc3aac45588c0112a32113b34345fda10331ac79498ec1287b6b49bee731d77e2a85ec94f8262bc7100bde156e2d68738abedca121beb8a88724c9702e221ec49353be4f0b8384c7950ec75ef502709bc218ad602c6568fcc284cce3f1eb5d917480b8e3a83c54617bf0ba4a35f062c169c5db9d662e79f06a6a57"}, {0x68, 0x111, 0x6, "caacc30ee771bb953b9a9f21f645d1b362df260ba008d7637983c4913e6c3eed4155f6afcdfd80a6e5ee3f03f4f5bbebf7f7aeb6367e2931eadcc9abf61a925dd76bcae15f7c3689d94d009b5161249975557ed6ea387d40"}], 0x270, 0x4004000}, 0x3}, {{&(0x7f0000003c80)=@pppoe={0x18, 0x0, {0x0, @local, 'bcsh0\x00'}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003d00)="08880897de17c129518af15086fa79984bb221defdcf27baaed21b2cb723922a1ed62aeb358c086575ae700ea672186774525c71edd8ccdf1b24253b5d96cc6e194a1a04b0f712d568761db723174c061a37b3453e17dab53c5fcb1cacfc340e4c53f59a9b01a93bb2ceeb81ca05ba96efb9e2878292338685f809e6a735", 0x7e}, {&(0x7f0000006700)="d128bf2a5350ec8efc0f322d8d7c4761270518da3b7aafa254ce2f2d36ff287c54e930d551518aeca9b7246c00000000221909c954dfd1ef87f7208610db1db99d69a480fe85d407e47cadbc82a99487545c3246b016c015648b036e5e5911257fd0c6c335dd38fe56d866cbbd373cec2cd30b663432eef6434deace585fd80fa141ecf4b8ab48c778457401ef500aa40d04cff5782ab5fc82862af8b77a689dbcbeea684ee1e57442778f639a6b7fcf665884935ca3b2b7ab1ee0a0149c8d61abd9fefe47b4476652c36362c1f109474a19cc4e25dc56b004215de207462c886737f87df8937262b7f3cfbf", 0xec}, {&(0x7f0000003dc0)="5bf2517e3ff6b495e4cd2d99bf5f5f0ba0d845661124a3c9539c85471e8001bdd56a839dc5bb0bb6ebaa5bb3fd09631c7d2e675319e4fe33333664c26c2cddb8fcd64b7bb7b9a1191396333daf9c9bea501c757163a166fb48283a3b2b009cfb1ba712b80ed1b8c742424c04cf5e62ca70d9e363ee", 0x75}, {&(0x7f0000003e40)="ee05ec18f22f77ef4636e5605bb7e6d3290404d69a654edf501106287cc2108ab7b8cfa0827f7e23532afdca8fe38e38019fe44dcf89721288d4eda6efe9a4", 0x3f}, {&(0x7f0000003e80)="0ed7305f0739df98a3ad6d5e48350f8b2e36023978c9b959105d0b728c020dd2fd178d0fe797ec92c6dbab6b9d30f0e636036b2a98333bf900495c17098533261b633df495f42aedefab488bb17def54a679a939d9a960b984c6fff8da5dd2392fa8897aaa95fc0299af2cecc10af7cc8cf0b275c1cc3c5919b9ef9614d663afb84325b99f9fb71c505d99eb976113594205cb4390563cc0678ae8f6a6e36e0a46003a2f4280d98f1f6a661f8d5d", 0xae}], 0x5, &(0x7f0000003fc0)=[{0x20, 0x101, 0x8, "d3a12e90330d23ab80"}, {0x5f, 0x11f, 0x3, "956ddcd751706f5f8e3995c1e28aa2263a17476bbfb165ed76e8abfbcdae388adf3736d7298a165c3b14534e54813315327b383000f1686fe1af8f9b790b155c473cd92dad5a4a3cc6e8fd185bdd6defa728f3a2895fab66a285382c8230aeea98da411762a713988efe682f52c823c0473dec503b1e70d74b15ae3ca92733b681673568b7338e31f6d429a17a330c7b83aaeb95328bc15c3c943f09bf09df8193dabc607ab239d4e84def28ab3b1fef977413ee18b88e9b08f26272736a45b62a31dee57a24e1"}, {0x1010, 0x1, 0x9, "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"}], 0x1108, 0x40000}, 0x5}, {{&(0x7f0000005100)=@hci={0x1f, r4, 0x1}, 0x80, &(0x7f0000006340)=[{&(0x7f0000005180)="6f9f1177a783f9140986a97039495370355fc013c3146c4b8e5c8deeb07f195ce60ddadb71b068473979894e3ceb967aea111b1a90e6", 0x36}, {&(0x7f00000051c0)}, {&(0x7f0000005200)="4dc5459ac74f20cbf92fbf05c03d15cc6a0db8e7febe59a6423909fe77049ff9b0488c285ec61fc580a043241dfa6ff4a010d9f354cd29704943ffa7f8ebea4a06660c95e6696a0e35380a79692ab84f13c37ba62239524301b4b58bbe585fcd569f7938744263c533b1799f87125174", 0x70}, {&(0x7f0000005280)="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", 0x1000}, {&(0x7f0000006280)="eed82e0f577081e691ed3181cebd6d51a72a628b118697ebb9a00494affac10b61736e684240a77aeff84bde6f585b31ab59c2ebf1ec8d5ccf938230300b9354e12227a9c7233785052e4bba1df2af6f0cdbfcbfa2f22ac271cfa820b1eff70731d7199777f8c7f215a06ffe812e1ba19053bc7a6a02a0af0f8d485e82b15cfb8e7c7c", 0x83}], 0x5, &(0x7f00000063c0)=[{0x10, 0x29, 0x2}, {0x50, 0x11f, 0x9, "ec9fb9c4177a365d871e9621b52568ad501823bfc93bd14c41d82896f80ea2588f77df19283faef9418ac684c3e4f1630bb62fb486d41d886b0565a33b9b4e"}], 0x60, 0x20000000}, 0x80000000}, {{&(0x7f0000006440)=@l2={0x1f, 0x2, {0x4, 0xffffffff, 0x5, 0xc250, 0x7, 0x6}, 0x8, 0xffffffffffffffe1}, 0x80, &(0x7f0000006580)=[{&(0x7f00000064c0)="5ae24070f38b71ac1faafdcd1643a921fbd8cddab22b48a7aff585ec4c04c9cef305277ae1eb16cb768ef930a5c1995fc1c5009a5c9cfc578a5e2f9f76511a14abbaaacaa6d5ce31e750315be3067096511464cf6288073e732b4ba0b91a6b9d33d62b54bf78d138f271398a07f9d01611fcdc99fcb2c8faf4ccdb86a2877dc62fa8e062b84a2983626bde", 0x8b}], 0x1, 0x0, 0x0, 0x20000000}, 0x7}], 0x5, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x110, r0, 0x0) 17:37:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x3000000}}, 0x14}}, 0x0) [ 387.666772] binder: 25123:25124 ioctl c0306201 200005c0 returned -14 [ 387.675179] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x751648df, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 387.713685] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 387.749184] Error parsing options; rc = [-22] 17:37:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) [ 387.768517] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 387.793022] binder: 25140:25141 ioctl c0306201 200005c0 returned -14 17:37:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) listen(r1, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="2478a488b2f5cb3cbe8af46a8281db1abd00000000e26e9550bde32215ffb19620d13356a553917a348971"], 0x1) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000002c0)}}], 0x1, 0x0) shutdown(r2, 0x1) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x501000) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f00000001c0)) [ 387.813500] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 387.888935] Error parsing options; rc = [-22] 17:37:14 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x25, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/qbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x3, 0x82a, 0x2, 0x0, 0x0, 0xbc, 0x40, 0x390, 0x10001, 0x9, 0x38, 0x1, 0x4, 0x3, 0x2}, [{0x1, 0x4800000000, 0x40, 0x8, 0x9, 0x1, 0x4, 0x3}], "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", [[], []]}, 0x1278) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000015c0)="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", &(0x7f0000000000)=""/16}, 0x18) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200000, 0x0) 17:37:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x9effffff}}, 0x14}}, 0x0) 17:37:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r1, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r3, 0x3, 0x2, [0x6, 0xe89a]}, 0xc) write$binfmt_elf32(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='$'], 0x1) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000002c0)}}], 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000200)={0x5, 0x6aadfe71, 0x20, 0x2, 0x1000, 0xffff}) shutdown(r2, 0x1) [ 388.146261] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 388.166990] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 388.177597] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 388.190589] Error parsing options; rc = [-22] 17:37:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nqd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 388.195606] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 388.229033] Error parsing options; rc = [-22] 17:37:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x3000000}}, 0x14}}, 0x0) 17:37:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000340), 0x1000) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 388.262476] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:14 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x2, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 388.328982] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 388.331725] binder: undelivered TRANSACTION_ERROR: 29189 17:37:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r1, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) write$binfmt_elf32(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="24e8478e2aa98b3b0d4d220c42f7652c2fa3c99f579e9e734203b4accd7368f93cb161643419e654"], 0x1) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000002c0)}}], 0x1, 0x0) fallocate(r0, 0x20, 0x20, 0x101) shutdown(r0, 0x1) 17:37:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nad'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 388.393692] Error parsing options; rc = [-22] [ 388.420856] binder_transaction: 15 callbacks suppressed [ 388.420873] binder: 25184:25188 transaction failed 29189/-22, size 0-0 line 2855 17:37:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @broadcast}, &(0x7f0000000140)=0xc) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 388.471745] binder: 25184:25188 ioctl c0306201 200005c0 returned -14 [ 388.484796] IPVS: ftp: loaded support on port[0] = 21 [ 388.510418] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 388.539216] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 388.570291] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 388.598810] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 388.610670] Error parsing options; rc = [-22] [ 388.621843] Error parsing options; rc = [-22] [ 388.825560] device bridge_slave_1 left promiscuous mode [ 388.831079] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.865941] device bridge_slave_0 left promiscuous mode [ 388.871363] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.940778] team0 (unregistering): Port device team_slave_1 removed [ 388.949618] team0 (unregistering): Port device team_slave_0 removed [ 388.958716] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 389.007686] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 389.062178] bond0 (unregistering): Released all slaves [ 389.375639] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.382057] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.389342] device bridge_slave_0 entered promiscuous mode [ 389.428459] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.434880] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.442191] device bridge_slave_1 entered promiscuous mode [ 389.480943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 389.519069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 389.633274] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 389.674776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 389.851767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 389.859405] team0: Port device team_slave_0 added [ 389.881780] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 389.889098] team0: Port device team_slave_1 added [ 389.913795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 389.942016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 389.979711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.011849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.252400] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.258773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.265423] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.271774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.278940] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 391.048331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.127301] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 391.135406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 391.209216] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 391.215566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 391.222522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.299727] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.811584] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 391.821882] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 391.825561] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 391.835062] Error parsing options; rc = [-22] [ 391.844377] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:18 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) fsync(r1) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x3, r2}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xc00e}}, 0x14}}, 0x0) 17:37:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nb\n'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:18 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x7a00, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 391.861890] Error parsing options; rc = [-22] [ 391.897091] binder: 25473:25474 transaction failed 29189/-22, size 0-0 line 2855 [ 391.916575] binder: 25473:25474 ioctl c0306201 200005c0 returned -14 [ 391.940777] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 391.945375] binder: 25469:25483 transaction failed 29189/-22, size 0-0 line 2855 [ 391.960918] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 391.962926] binder: 25469:25483 ioctl 4008af20 20000040 returned -22 [ 391.979246] binder: 25469:25483 ioctl c0306201 200005c0 returned -14 17:37:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x10002, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000004c0)=0xfffffffffffffffa) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000500)=0x194) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000147, 0x74000000) ioctl$VT_WAITACTIVE(r1, 0x5607) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000000080)=""/19, 0x13}, {&(0x7f00000000c0)=""/135, 0x87}, {&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f0000000340)=""/23, 0x17}, {&(0x7f0000000380)=""/79, 0x4f}], 0x6, 0x0) 17:37:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="11634840a35580e43f6576170ce06679d40aea6ce0ae00fe67d8364c84af00e4986ea005000000000000000000004900000000000000000003000000000000000000000000000000e377e3990094c50b1fb3ff24a2ecd5d24bf22dd9023c2b2cfbf4dc52f7febc4af344f3ce8011a8c9ead169acb9321e653b08e0b46a097186e183fb90edd3ec6b234b196c2883d552cd20aa729a401e97d87f5e60c2a5f92239d81e0148d5c8994f42b2ec11a14f7967d8d8a13ecb0697c5835d1c0e9ef8d5c7b549033b5e06ea90d11eb5fdcfb79bd5070278671983a6cf157a82699c71aa58ef02e27efff88d7708c321a3ce8ad48022", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) 17:37:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = semget(0x1, 0x2, 0xa0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000000)=""/65) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 391.991305] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.010949] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nb%'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = dup3(r0, r0, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x17) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f00000003c0)={0x1d, r3}, 0xfffffffffffffeb2) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 392.076374] Error parsing options; rc = [-22] [ 392.081038] Error parsing options; rc = [-22] [ 392.089524] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.102403] binder: 25490:25491 got transaction to invalid handle [ 392.133140] binder: 25490:25491 transaction failed 29201/-22, size 0-4784128 line 2855 [ 392.146388] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.148204] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.171852] binder: 25490:25491 ioctl c0306201 200005c0 returned -14 17:37:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ff, 0x88041) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 392.181456] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.194352] binder: 25490:25491 ioctl 894b 20000080 returned -22 [ 392.197610] Error parsing options; rc = [-22] 17:37:18 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x400000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 4: r0 = socket(0x10, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) write(r0, &(0x7f0000294f74)="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", 0xfc) [ 392.226703] Error parsing options; rc = [-22] 17:37:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x40030000000000}}, 0x14}}, 0x0) 17:37:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbq'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 392.310097] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. [ 392.322342] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.342767] binder: 25525:25529 transaction failed 29189/-22, size 0-0 line 2855 17:37:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0xdcf9, 0x2) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 392.364721] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.383950] binder: 25525:25529 ioctl 8912 9 returned -22 [ 392.392008] binder: 25525:25529 ioctl c0306201 200005c0 returned -14 [ 392.400668] binder: 25525:25529 transaction failed 29189/-22, size 0-0 line 2855 17:37:18 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000000)={0x80, 0x20000800, 0x2000, 0x5d, 0x7, 0x9e39, 0x6, 0x20, 0x8, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0xbfc, 0x10001, 0x0, 0x0, 0x80000000, 0x3, 0x6, 0xe76a, 0x22f, 0x38, 0x339, 0x1, 0xb7d, 0x20, 0x2, 0x1, 0x4, 0x10001}, [{0x7, 0x7ff, 0x1, 0x8, 0x0, 0x100, 0x9d, 0x1}], "b41778e0d7070f2cfad1c46c5c2b153365f7cb4f1907ed249ece2f00d9e7693635f9420f6e278d96fb4274bdc766b02fdd6d9420aa3e41a6b55e594b0cb846549f97a6103cc280c266f92992e36cdf53e6b7598380dfb0e0224922dd18313bd8c7792796aae6f35c6ff1eedccca6b6c40f575ae05a0e14d597882f2daa0d123a4aaad84c3f231c8fa9d4fd7e522a07061682ddb61b12b14b79a6fa718c96d1065b3a70dede27a23f0f2ee82554ac34c6335890716e952fcde803695aa315af46218287d8c24262988882e9bdf5e71b39749683799fa99696d64db54dca85790c235490b3"}, 0x13c) syz_emit_ethernet(0x140, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x2, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) [ 392.409102] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.429543] Error parsing options; rc = [-22] [ 392.429566] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.441489] binder: 25525:25535 ioctl 8912 9 returned -22 17:37:18 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xedc0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xd4, 0xd6, 0x3}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x7ff, 0x100000000, 0x8000, 0xffffffffffffff00, 0x2, 0x0, 0x400, 0x6, r3}, &(0x7f0000000180)=0x20) 17:37:18 executing program 4: prctl$void(0x211000000017) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000040)=0x476ea49d, 0x4) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x8000}}, 0x10) sysfs$2(0x2, 0x7, &(0x7f0000000200)=""/185) [ 392.457663] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.460170] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.482703] Error parsing options; rc = [-22] [ 392.489214] binder: 25525:25529 ioctl c0306201 200005c0 returned -14 [ 392.496001] Error parsing options; rc = [-22] 17:37:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={"2f6465762f6e62e0"}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x200000000000000}}, 0x14}}, 0x0) 17:37:18 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x800) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000001c0)=0x5) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000280)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000000c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0x40046208, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)}) 17:37:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000040)={0x6, 0x3}) [ 392.577349] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.611453] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.622691] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.639032] binder: 25562:25574 transaction failed 29189/-22, size 24-8 line 2855 [ 392.640838] binder: 25563:25564 transaction failed 29189/-22, size 0-0 line 2855 [ 392.670510] binder: 25563:25564 ioctl c0306201 200005c0 returned -14 17:37:19 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6255, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r2, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 392.679489] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.697781] binder: 25563:25564 ioctl 401070ca 20000040 returned -22 [ 392.704371] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.716003] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.718744] binder: 25575 RLIMIT_NICE not set [ 392.746448] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.748175] Error parsing options; rc = [-22] [ 392.764135] Error parsing options; rc = [-22] 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r1) r2 = dup(r1) recvmmsg(r2, &(0x7f000000a000)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000100)=""/163, 0xa3}, {&(0x7f0000000340)=""/201, 0xc9}, {&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000440)=""/136, 0x88}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000240)=""/112, 0x70}, {&(0x7f0000002600)=""/186, 0xba}, {&(0x7f00000026c0)=""/244, 0xf4}], 0x9, &(0x7f0000002880)=""/98, 0x62, 0x1f}, 0x8}, {{&(0x7f0000002900)=@un=@abs, 0x80, &(0x7f0000000080)=[{&(0x7f0000002980)=""/4096, 0x1000}], 0x1, &(0x7f0000003980)=""/233, 0xe9, 0x90d7}, 0x10001}, {{&(0x7f0000003a80)=@nfc_llcp, 0x80, &(0x7f0000000580)=[{&(0x7f0000003b00)=""/255, 0xff}, {&(0x7f0000000500)=""/60, 0x3c}, {&(0x7f0000003c00)=""/207, 0xcf}], 0x3, &(0x7f0000003d00)=""/144, 0x90, 0x9}, 0x278eab97}, {{&(0x7f0000003dc0)=@ipx, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e40)=""/71, 0x47}, {&(0x7f0000003ec0)=""/53, 0x35}], 0x2, &(0x7f0000003f40)=""/49, 0x31, 0x4}, 0x2ca2}, {{&(0x7f0000003f80)=@generic, 0x80, &(0x7f0000006280)=[{&(0x7f0000004000)=""/61, 0x3d}, {&(0x7f0000004040)=""/198, 0xc6}, {&(0x7f0000004140)=""/17, 0x11}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000005180)=""/245, 0xf5}, {&(0x7f0000005280)=""/4096, 0x1000}], 0x6, &(0x7f0000006300)=""/48, 0x30, 0x3}, 0x5d}, {{&(0x7f0000006340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000006500)=[{&(0x7f00000063c0)=""/101, 0x65}, {&(0x7f0000006440)=""/17, 0x11}, {&(0x7f0000006480)=""/117, 0x75}], 0x3, &(0x7f0000006540)=""/17, 0x11, 0x2}, 0x5}, {{&(0x7f0000006580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f00000068c0)=[{&(0x7f0000006600)=""/64, 0x40}, {&(0x7f0000006640)=""/73, 0x49}, {&(0x7f00000066c0)=""/37, 0x25}, {&(0x7f0000006700)=""/249, 0xf9}, {&(0x7f0000006800)=""/179, 0xb3}], 0x5, &(0x7f0000006940)=""/108, 0x6c}, 0x10000}, {{&(0x7f00000069c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000008f80)=[{&(0x7f0000006a40)=""/68, 0x44}, {&(0x7f0000006ac0)=""/216, 0xd8}, {&(0x7f0000006bc0)=""/156, 0x9c}, {&(0x7f0000006c80)=""/236, 0xec}, {&(0x7f0000006d80)=""/4096, 0x1000}, {&(0x7f0000007d80)=""/4096, 0x1000}, {&(0x7f0000008d80)=""/204, 0xcc}, {&(0x7f0000008e80)=""/203, 0xcb}], 0x8, &(0x7f0000009000)=""/4096, 0x1000, 0xc7}}], 0x8, 0x2000, &(0x7f000000a200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 392.774266] binder_alloc: binder_alloc_mmap_handler: 25562 20001000-20004000 already mapped failed -16 [ 392.794498] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.809610] Error parsing options; rc = [-22] [ 392.814299] binder: 25584:25585 transaction failed 29189/-22, size 0-0 line 2855 17:37:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x9effffff}}, 0x14}}, 0x0) 17:37:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 392.826662] binder: 25562:25587 transaction failed 29189/-22, size 24-8 line 2855 [ 392.827652] binder: BINDER_SET_CONTEXT_MGR already set [ 392.840008] binder: undelivered TRANSACTION_ERROR: 29189 [ 392.868982] Error parsing options; rc = [-22] [ 392.875549] binder: 25574 RLIMIT_NICE not set 17:37:19 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf6ffffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x1, 0x2, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) ioctl$void(r0, 0xc0045878) r2 = dup(r1) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000003, 0x11d, r2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000080), 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xac, 0x0, &(0x7f0000000600)=[@acquire={0x40046305, 0x3}, @exit_looper, @increfs, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000240), &(0x7f0000000280)=[0x20, 0x40, 0x30, 0x40, 0x48, 0x38, 0x38, 0x30]}}, @decrefs={0x40046307, 0x3}, @transaction_sg={0x40486311, {{0x3, 0x0, 0x2, 0x0, 0x11, 0x0, 0x0, 0x30, 0x0, &(0x7f0000000180)=[@fd={0x66642a85, 0x0, r3, 0x0, 0x3}, @flat={0x77622a85, 0x10a, r4, 0x1}], &(0x7f0000000240)}, 0x1f}}], 0x1, 0xfffffdfd, &(0x7f0000000400)='K'}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x40, 0x4) [ 392.881738] cgroup: fork rejected by pids controller in /syz2 [ 392.890201] binder: undelivered TRANSACTION_ERROR: 29189 [ 392.901853] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 392.920904] binder: 25562:25586 ioctl 40046207 0 returned -16 [ 392.928377] binder: undelivered TRANSACTION_ERROR: 29189 [ 392.955847] binder: 25597:25602 ioctl c0306201 200005c0 returned -14 [ 392.966683] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 392.967223] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:19 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x2c25) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0xfffffffffffffdda) fstat(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r5) splice(r1, 0x0, r0, 0x0, 0x3cceb664, 0x0) 17:37:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x1fffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) socketpair(0x8, 0x4, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 393.004112] binder: 25597:25606 Acquire 1 refcount change on invalid ref 3 ret -22 [ 393.021374] binder: 25597:25606 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 393.023411] Error parsing options; rc = [-22] [ 393.030619] binder: 25597:25606 ioctl c0306201 200005c0 returned -14 [ 393.045418] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.064090] binder: undelivered TRANSACTION_ERROR: 29189 17:37:19 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xc0ed0000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf0ffffffffffff}}, 0x14}}, 0x0) 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) [ 393.105461] Error parsing options; rc = [-22] [ 393.150800] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = dup3(r0, r0, 0x80000) sendto$unix(r1, &(0x7f0000000040)="0e3a02b80b9aa29b10a84e335f48f53d0c0395cb4dd4a9e97630", 0x1a, 0x20000000, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000140000000000000000950000fe00000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000003c0)={r0, r2}) sendmmsg(r4, &(0x7f0000006b00)=[{{&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002a40)="06", 0x1}], 0x1, &(0x7f0000003e40)}}], 0x1, 0x0) close(r4) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000240)={0x7, 0x8}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x110) close(r3) 17:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10081, 0x0) r4 = eventfd(0x3) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x1) io_submit(r2, 0x4, &(0x7f00000003c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x800, r0, &(0x7f0000000140)="1fc6dfec1d4b3245a66d44d0e14e62fd4b804a5d2744672a40aad5c8fad1f0f78530ce67a2fe8807dcb961063f3ed400415d08a6020b6c12739ff55493c48797158209a27b0e81c51f39f53c973fa5da0d11b10e39b5f48e13efcd47cbfc4900c769b8db1e574d57fadcac4a6c6903571d82770e5c7d1a1f1b608e3fbe02bf41628b0a55434a84c23ac43e404f6e97bef0376e1f9524ccd42760f5f432dfec70cf18a2b0b1df8a61471545fdbf81db5e", 0xb0, 0x3, 0x0, 0x1, r3}, 0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffa, r0, &(0x7f0000000200)="b111b9e30a528e951cd7dcbd461b2bf3b98e2437be8ef078275e3769575da60da11498728861e197cf923900", 0x2c, 0x400, 0x0, 0x3, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x40, r1, &(0x7f0000000280)="8f44789267aefebb9eac5ea85fdc2c7503d08e69fd6674dca9faee2948f3122a66d54efc2a5f78932f85d4f44f397a21a6d442d1aa079641cbc1657418daa562bdbece", 0x43, 0x3f, 0x0, 0x0, r5}]) [ 393.196282] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.208282] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.218555] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.243271] binder: 25626:25627 ioctl c0306201 200005c0 returned -14 [ 393.251917] binder: 25626:25627 ioctl 8905 20000040 returned -22 [ 393.260336] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="3191d0702c317161"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x4, @local, 0x7}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x10}, 0x9000000}, @in6={0xa, 0x4e24, 0x80000000, @mcast2}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={r4, @in={{0x2, 0x4e21, @multicast2}}}, &(0x7f0000000180)=0x84) [ 393.288186] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.305448] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.319731] Error parsing options; rc = [-22] [ 393.334175] Error parsing options; rc = [-22] 17:37:19 executing program 4: msgrcv(0x0, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400002, 0x2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000080)=0x5) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 17:37:19 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 393.341652] binder: 25646:25647 ioctl c0306201 200005c0 returned -14 [ 393.350462] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.374505] binder: 25646:25647 ioctl 400454cb 1 returned -22 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r2, 0x7, 0x2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x4) [ 393.397625] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.410194] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.415514] Error parsing options; rc = [-22] [ 393.421191] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.429925] Error parsing options; rc = [-22] 17:37:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 393.459064] binder_transaction: 5 callbacks suppressed [ 393.459079] binder: 25658:25661 transaction failed 29189/-22, size 0-0 line 2855 [ 393.473210] binder: 25658:25661 ioctl c0306201 200005c0 returned -14 [ 393.485563] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xc00e0000}}, 0x14}}, 0x0) [ 393.521739] Error parsing options; rc = [-22] 17:37:19 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1163484000000000000000d8fc41e00000000000001000000000000000000000000000000000000000000000000000000000000071c41a568ae5034b1d1491", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x20}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x3, 0x8, [0x0, 0x7fff, 0x1000, 0x8, 0x756, 0x1, 0x1, 0x7]}, &(0x7f0000000340)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r4, 0x3}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r5, 0x3, 0x4, 0x77}, 0x10) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) 17:37:19 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x600}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 393.548973] Error parsing options; rc = [-22] [ 393.607368] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.636307] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0xec3362048fa15fcf, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x80000) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8080, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000140)=r3) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000000000)}}], 0x1, 0x0) [ 393.665448] Error parsing options; rc = [-22] [ 393.680797] binder: 25681:25683 transaction failed 29189/-22, size 0-0 line 2855 [ 393.694846] binder: 25681:25683 ioctl c0306201 200005c0 returned -14 [ 393.703640] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="00000221c7000100"], 0x0, 0x0, &(0x7f0000000300)}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) close(r1) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x204400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 393.715825] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.740011] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.742993] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.753032] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 393.781928] binder: 25695:25696 transaction failed 29189/-22, size 0-0 line 2855 [ 393.805307] Error parsing options; rc = [-22] [ 393.809228] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 393.813419] binder: undelivered TRANSACTION_ERROR: 29189 [ 393.838360] Error parsing options; rc = [-22] [ 393.843173] Error parsing options; rc = [-22] 17:37:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x300}}, 0x14}}, 0x0) 17:37:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) shmat(r2, &(0x7f0000ffa000/0x2000)=nil, 0x1000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:20 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:20 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8440, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000080)=0x2, 0x8) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x77622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 17:37:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000001200000000"], 0x0, 0x0, &(0x7f0000000300)}) close(r1) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:20 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 394.274307] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.280270] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.284731] binder: 25709:25711 transaction failed 29189/-22, size 0-0 line 2855 [ 394.328781] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.336509] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.340895] binder: BINDER_SET_CONTEXT_MGR already set [ 394.360169] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.378060] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.387400] binder: undelivered TRANSACTION_ERROR: 29189 [ 394.393707] binder: send failed reply for transaction 252 to 25717:25718 [ 394.400732] Error parsing options; rc = [-22] [ 394.405342] binder: 25717:25718 ioctl 40046207 0 returned -16 [ 394.415153] binder: undelivered TRANSACTION_ERROR: 29189 17:37:20 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) r2 = syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x2, 0x1) getsockname$netlink(r2, &(0x7f0000000740), &(0x7f0000000780)=0xc) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xef8b) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x34000}}, 0x14}}, 0x0) 17:37:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x9a002, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000140)=0x0, &(0x7f0000000180)) write$smack_current(r2, &(0x7f0000000680)='ERROR\x00', 0x6) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) fchownat(r2, &(0x7f0000000040)='./file0\x00', r3, r4, 0x1900) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000600)={r5, 0x1, 0x6, @random="bcd5703e1e66"}, 0x10) connect$inet(r2, &(0x7f0000000640)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x1e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000280), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x274) 17:37:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2000000080) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x400000000000384, 0x22, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x800) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x1e, 0x4, 0x43f7}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xffffffff, 0x20, 0x2, 0x10001}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x7fffffff, 0x7ff, 0x0, 0xfff, 0x4}, 0x14) [ 394.421147] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.428465] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.465304] Error parsing options; rc = [-22] 17:37:20 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 394.512487] binder: 25732:25735 transaction failed 29189/-22, size 0-0 line 2855 [ 394.523824] binder: 25732:25735 ioctl c0306201 200005c0 returned -14 [ 394.531991] binder: 25732:25736 transaction failed 29189/-22, size 0-0 line 2855 [ 394.540608] Error parsing options; rc = [-22] [ 394.546522] Error parsing options; rc = [-22] 17:37:20 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x300}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 394.570782] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.585899] binder: undelivered TRANSACTION_ERROR: 29189 17:37:20 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6, 0x0, 0x0, 0x1}]}, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa4, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x1}, 0x40000c0) seccomp(0x1, 0x1, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x9, 0x3, 0x2af1, 0x5}, {0x546, 0x8000000000000, 0x8, 0x401}, {0x1, 0x80, 0x9, 0x4}, {0x9b5b, 0x800, 0x3ff, 0xffe}, {0x5, 0xffffffff, 0x1ca, 0x58}, {0x5, 0x5, 0x4, 0xff}, {0x78b, 0x400, 0x3f, 0x1f}]}) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x7, 0x1ff, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x4) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) socketpair(0x1f, 0x80807, 0x200, &(0x7f0000000080)) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 394.632464] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.655159] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.688198] Error parsing options; rc = [-22] 17:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0xb, 0x10, 0x1, "40d4ff1ff4733e84c85d4fd44b06c989aedc0e413adaa91975e88cab1df86b2735ab67998e07b250b20ac0222c45530554a48a1d47c61948cb4537ce42797acd", "15af13d0df9aef91cf6ca6cf81a67bafbd94186870fc94245a06e27baa28433cc696c5d212928a6cc7517bf8be38d0263fbe78530f30a89aa66254a27cf0413c", "0336976ae5c04835fe494488608574b53e91801b05b5dcb5a0ffc847fda41c16", [0x0, 0x414c]}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) utime(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)={0x2b78c3b9, 0x7}) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="1bf0e1d7833f48ba0fbab70222e7a0dedef06b421fd77be08f2c76ebad24311eb88964a955a4c1c82da6b737fd7f26209fa81f3242dcde5796d0d2ab4dafbed47d7bf4e260d96c554d4581041eddd3952c10c8c6375741a3cfcc8660a834fe2105d6492531e20f7f034f592db0d3846e7a27d2b26964d0140bd0f0c2f00cd07d7af908b066791c56b526b6b0d2295bbb73fb5e", 0x93}, {&(0x7f0000000040)="fcb75425f59b8ec46e4d5ecb8ec0e2a6", 0x10}, {&(0x7f0000000080)="f8e931e81c69281a580567e842992d25392064592285914186ce59c9266a79557f66b552bb7c9309a1e4aeaef293ed8763efe3a773cf", 0x36}, {&(0x7f0000000200)="add560f283568edcc5f06757eae3e5af365523bc2d3a0b5e4d264fca708f0c5aa5547735440a94ee6c53148ae27407a01e86ba89034ca1cd9eb6161f9fc293695d0eaad85ce61470308e3db03ee11f339c9a16aa0862d45d21100926c20fa20b8621e2c42c2654480f511abc7ff93317ceb2f8de32d94f072b17", 0x7a}, {&(0x7f0000000280)="fbc0c835e85415931bbcd330", 0xc}], 0x5, &(0x7f0000000000)}, 0xb72}], 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000580)={0x0, 0x3}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000600)=ANY=[@ANYRES32=r3, @ANYBLOB="0000ec00b49e0b681292c25f832fe008474d86e5168e5f1d23b85a7c0fe808fd41f94a88aafa405e544f5623b65eaf92b0b4017bcbdf4d5cbf28c95ce926b838170900bb011983dc78e16c0ab526cde5d9bbc178d31d563385969f70681fd478630ddf5e9f7d96c677084fc2b38e9718e6af716ed8e4d6bd872c1c9c0f8166c158d74ba06b5cb0d641a6fb5e738a8ba3d2c81a37bdde9b2e94e9b8926097b50bdc1377b00cf75c6817d611c43aace04a695a1fc61da7c513192b77fc846474e7a4d832efe814ed2517116e332971f2cdc05ae3cbce0a2f06a7bbfa85573b089aaadbf48e3b0f32bd206e9e5ad1550939"], 0xf4) 17:37:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}}, 0x0) [ 394.711741] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.748923] binder: 25754:25761 transaction failed 29189/-22, size 0-0 line 2855 [ 394.756788] Error parsing options; rc = [-22] 17:37:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x400000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:21 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xfffffff6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:21 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x8001, 0x0, 0x0, 0xbc01]}) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000999000)="390000001300094700bb61e1c3e4ffff06000000020000004500000020000000190029000dffffff9e00280f00000007fd17e9ffff06060400", 0x39}], 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000140)=0x30) 17:37:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000040)=0x400, 0x4) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 394.864394] netlink: 'syz-executor4': attribute type 41 has an invalid length. [ 394.880659] binder: undelivered TRANSACTION_ERROR: 29189 [ 394.898482] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:21 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x228e80) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x7, @empty, 0x101}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) [ 394.903244] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 394.929173] binder: 25783:25785 transaction failed 29189/-22, size 0-0 line 2855 [ 394.930307] netlink: 'syz-executor4': attribute type 41 has an invalid length. [ 394.942817] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 394.951021] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 394.971966] Error parsing options; rc = [-22] [ 395.000593] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x100e00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000200)={0x0, 0x0}) bind$unix(r2, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) sendto$unix(r3, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) close(r3) connect$unix(r4, &(0x7f0000000140)=@abs, 0x260) 17:37:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x10, 0x0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x7, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:21 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x141000) splice(r1, &(0x7f0000000040), r0, &(0x7f0000000080), 0x1, 0x2) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0xaf) 17:37:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xffffff7f00000000}}, 0x14}}, 0x0) [ 395.022530] binder: undelivered TRANSACTION_ERROR: 29189 [ 395.048488] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 395.108250] binder: 25799:25802 unknown command 0 [ 395.114549] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:37:21 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 395.170466] Error parsing options; rc = [-22] [ 395.175392] binder: 25799:25802 ioctl c0306201 200002c0 returned -22 [ 395.196077] Error parsing options; rc = [-22] [ 395.208819] binder: 25799:25802 ioctl c0306201 200005c0 returned -11 17:37:21 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x100) ioctl$KDSETLED(r0, 0x4b32, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 395.242340] binder: 25799:25807 unknown command 0 [ 395.251497] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 395.276935] binder: 25799:25807 ioctl c0306201 200002c0 returned -22 [ 395.290579] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 395.329844] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000140)=0xc) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="37000000ff03000004000000000000003f000000070000008100000000000000070000000000f6dc79000040f603000002000000"]}) 17:37:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xffffff7f}}, 0x14}}, 0x0) [ 395.371409] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:21 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 395.452585] binder: 25823:25824 transaction failed 29189/-22, size 0-0 line 2855 [ 395.470453] Error parsing options; rc = [-22] [ 395.489653] Error parsing options; rc = [-22] [ 395.522094] binder: 25823:25824 ioctl c0306201 200005c0 returned -14 [ 395.551197] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 395.569743] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 395.596716] Error parsing options; rc = [-22] [ 395.601397] binder: 25823:25836 transaction failed 29189/-22, size 0-0 line 2855 17:37:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000000000)=[{0x18, 0x11d, 0x401, "1375cb57c5d816"}, {0x48, 0x11f, 0x8000, "0626e414dafb90dcf8460f5b1cb5e4acecf31f3ce2dc22a6decdc1f71df754c84d657fc236293ca2fc4da53123e1e2ac45548186f5"}], 0x60}, 0x3}], 0x1, 0x0) [ 395.619713] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 395.666055] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 395.725950] Error parsing options; rc = [-22] 17:37:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xc0ed0000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x100e00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000200)={0x0, 0x0}) bind$unix(r2, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) sendto$unix(r3, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) close(r3) connect$unix(r4, &(0x7f0000000140)=@abs, 0x260) 17:37:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x60, 0x0, &(0x7f0000000100)=[@release, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x18, &(0x7f0000000040)=[@fda={0x66646185, 0xa, 0x1, 0x2a}], &(0x7f0000000080)=[0x40, 0x48, 0x38]}, 0x2}}, @exit_looper, @acquire={0x40046305, 0x1}], 0x91, 0x0, &(0x7f0000000340)="8dfa7844d2ffe5b1bc6d57de2e9ab97b2396a5750d341203cf21b2e7b49309830665970e7f3a56ee159b6972a0cebf81b62d171999fd0dd35d305d2aafefc4cc2ec678caef7e09ade4e254a55b475c36be36a69b496fa5da960509401c64180079fa3662fec085418b7bdb7df4a35949c6577dceb5879f0889f22cdca65f5cba9b03b17731c486fafe2e199eade0cc24bc"}) 17:37:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf0ffffff}}, 0x14}}, 0x0) 17:37:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000000)={0x3, 0x0, 'client0\x00', 0xffffffff80000004, "a345dfc9860b3208", "23367f7ea7a6602d10ca525a2201cd8cd0b9428d1124494c63e52701c3199729", 0x35b6, 0x1000}) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x21e, &(0x7f00000022c0)}, 0xfffffffffffffffe}], 0x1, 0x0) 17:37:22 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x7000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 396.129275] binder: 25854:25855 ioctl c0306201 200005c0 returned -14 [ 396.129656] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 396.166731] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xb0, 0x4000) write$apparmor_exec(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="83be61636b20007e528ff9c4ab146d9e2d386cc73dabf0a3aaf9d647f63bd6bc6990768f1af62a44bb941f6c576e081e1683764f89dfd6e1171b00337f65329de099b7993e59377884f50b2c5f3bd9f7264d9eab8e4ad107a283a88539839505065c33456ba2b18c6048593abab97a6372dc3b707ac131e5b09459a8e694a87b42d907b31700f8624d1f05ac4c4fbf40789b43e493a112ebadb927c487a640cfb204a7c783e018327a97fc35cd17a9f6dfedbb9707d5d480795f845019d98bec41a77c52d2df"], 0x7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) [ 396.182604] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.197177] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 396.209301] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.235894] binder: 25854:25855 ioctl c0306201 20000180 returned -11 17:37:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000000000000000efa994090f8ae11f7a72db8265c055364fd8ce872231eddb2192035738deee1c710a2f7134caa107bd9cafb9a0a6a58abddf7930a4fd8a96bbb62a814997f7bb7e8af24c264b"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), 0x296, 0xfffffdfd, &(0x7f0000000080)='K'}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000240)=0x1e) [ 396.295524] Error parsing options; rc = [-22] 17:37:22 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xffffff9e}}, 0x14}}, 0x0) 17:37:22 executing program 0: socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x3, 0x4, 0x4c0, 0xfffffffffffffffa}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 396.358044] Error parsing options; rc = [-22] [ 396.361521] IPVS: ftp: loaded support on port[0] = 21 [ 396.381095] binder: 25872:25873 ioctl 800454d7 20000040 returned -22 [ 396.427802] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000006fc0)=[{{&(0x7f0000000000)=@ax25={0x3, {"b83f009a48a172"}, 0x9}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)="e888b6cd114b262ed4cf38403a99e16d0952395f6b47d996d497c60707995b2e92a284058eae0d78bc553d6ae3ac5e0f547e0303b1983f6ffc2355bee9c361630909a40def12ec260305dc414ac4d0864a565c7aa87a21982febeb81823bc825f200c89dfe50c90c89b608d19382dad7c8b5ff6022f5e4f6ef650937766243289e5474fdb2de665600241212b6e51766454510b063907b3e7ca4fccb36865dd3a5c578ad04ff4af4274d8e2b6440038d2bbd2ae22a9f7ef950d8964db66844546fcf73232696399dadc4d9bbfdfd11c100631d8608dc66b455f69be6632e3e5ec494a1", 0xe3}, {&(0x7f0000000240)="d1ac7f10b0f23cddfc9fee43f72e8ad14e537af9699c2bf0aeacc24738395ff3b6e0a6e020c52cece6b88792818c150787fdeb3e60af84f62d01da61c1427e81ca4fe55d769de81eb55b6112081e88dee0ab58550dd6a83ce3d6934a8a2f", 0x5e}, {&(0x7f0000000340)="379549c1004c349568068cb22a4772a7f22d603922adec755de693af963561f5840b0c265bfc436dadd58759708492f8444e63bdbbe9947a3c25e7baabac72b4246f8aa8eecb18752fd5587b3984591f350804cbda9597fd49e1dd41457d7b39721e696094d30b5add4d054ac9c7dd8b3736", 0x72}, {&(0x7f00000003c0)="fd444a2fec29684fe29fffb89ea34b2567ac9250494d1adaa76c245fa42bea886ea8d7a831a680d6fff73336717de7417ab1c8d2cecfda09f9bd06a0930414c3e5feb660a7d0a00bdbcae099d8a366847c9b387c5bcdd6a66da21666ac4dfa0c50659fe55d7e167c85de00edfc4852d370de41b76be6811e794ab8dc692060279543badf3f0f4345953197d8aa4963f300d6ad9b1693e4d2d1d5f5251eefae703b15187df0bc5ac3756ea17cc165a174bb8f5a7fb020f21bdd0ef8c91bd1132ef4587200505a8ce81e910ab59a8bcda16747a3cfbb28eb6c44ece1b147c44992b1", 0xe1}, {&(0x7f00000004c0)="3979656a4b717f233be546169e661d489f3d58eac09f14695e09ebe3d09b304cde15a2481a91e914ed3ea15e63d81b13e4eb8a8b44c796ef1da8dbc288abd531a4be4accb80ec22483b73ea06d850f1ced4257e4667a36afdb6e481dc7d7856d97477ddf0844b22eee222f7903e88be11ed2b2caab59c430726ef11dedc0", 0x7e}], 0x5, &(0x7f00000005c0)=[{0x90, 0x19f, 0x0, "051e58eb9255e4972eb601af3d064c0cb9817c4af738ed1a129c0592e2a923373dcd17e38512d213e58fe3ae836fe34fcd44c687b69c063eb4da5c21ce9f0f72486fcbfd6c8cba2114266ae89034e07163719da85ede26926efc4daab3d312587814c6ff3c630ba76276de4b1e371946584d59b72377fb09c495c6"}], 0x90}, 0x800}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000680)="0214c403db4fd38d4cb52320768564e7273d4906d3378526db13d53877abf98af2de1541fb9f9736fdf9ec0579c597a6dbfddaaa8920f8ce25d843cb294f92d3376bcff0f92f87d560a0ed55193c021b2922b5d273e21045bc947be8fdb9032dbe4d18780b8721956aaa1263d4bd9459ca801139f566a9986a6106e4ef140e77a0e10a5946c95204168c2103d2cbd9a868ca810cd62715b33f83eb8a3c02ddf89bbbf28a79c3421898f77d5eb63998622a1c2ade3cbaf53be6dcee62e9014a0440fb062c1e25eece4dcbeb68d50cf58504aca0fb1b6190dcbb5584c8fe86ba04400889f3e3559e0d465ed7e6ad6e9a624c8be7", 0xf3}, {&(0x7f0000000780)="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", 0xfe}, {&(0x7f0000000080)="b6f0cc71aafa93fd7e11cffbcb849842dfb1d9ebe37f1a84d521797ed3f888d47a17", 0x22}, {&(0x7f00000002c0)="46274a54ac139173e6873f0859fb23a5d161860103f36c4ff2d875e7a3f449d31826ba2badf0cdc716", 0x29}, {&(0x7f0000000880)="924656a53d8e581e9068da86ffc99c6837a2527ff4b8636845fe588fbe01df66fd989480d0c3ec460f006043cb6d3c053dacde2014212a09451a1b5c9dfbcc105f490513f5a3565b19df4a3bd6f10d593aeaf7afd92e00ede7cc9ff72822720d596ca1553974", 0x66}, {&(0x7f0000000900)="35c0abfa6499c2b273daaf93b099392ef99fa8977ec2f89884c0fdad610020063454b9dd57c52294e90a8e2df66a9a3671c1e218fa275ad2dbe4f39bd9ac2cc1b54d89141e872290123dca74c009be7b88ac2b716c39bbad6e2a27e392f5289a3bae37857ad429bca03cd5e4ca1fc4d127a59cf9e656224602f0e1363bac4f004c0fadd57763fb5ddec3212c8b65c7098de74fa591e6bb467adaf742b28907b6942598c62fec57b56f87bc4fb68e03fc54ef1aebaee3b9e7a7c764a4dd7be6c5d8727c", 0xc3}, {&(0x7f0000000a00)="7bab7cd7860a841c2cdf4d9ac1a3eb11f4eb061ca2656182fc9ff3eb8442a9d7efef0a7dcfd64dec29b395f26f2a61354dfe3669a81e3e5f3a429b3bcd49426be68263b800595846ee6d33c8a8c0258e6f685bdc014eab169f138ff6043ea9e41ff832b4ccad2d7d05c0b7ea4df910ba6c4e1a73a7bce2736649336a5c7fc6b3a7a70ed8560e857b2d1af9cea1dd1a3c7f1442edea37efa1ebe618980958ff5aab17d65df7cf391818425fb25d653dadb74f", 0xb2}, {&(0x7f0000000ac0)="c8dd1f872c6d774dc03e2d100266d1f1e5fa33e191b3391781b9848aaeeb50a7334f4bfb", 0x24}, {&(0x7f0000000b00)="1270c847d788b725d58b40319ad7b15faa31090f9e31a05207d7d38caf7d7a28e7a2bf29fa41f4d10d8cee3127f9574c59049d310c76ce21a9e8", 0x3a}], 0x9, &(0x7f0000000c00)=[{0x30, 0x10f, 0xffffffffffff8000, "8c2fed6dbb0147770f6a3545afbb5e2f6b7c918d1bf238c7c96def50b55e6082"}, {0xb8, 0x10d, 0x6, "687f17e388c4459f56eece769316fd2bcc1b477bf02278b45cb92eeb94000bba4469fe45a96f038997e40af2c03e0669f45646c94cd5bcd05b33e92b927ff2d40c13496312ca45983f62dba4c90576ddeff2eef1819ad129cfe485c12f871af8f230d8d30b58d05a1e4d97198fb42b6041a05aeae51b327756f8ed4f8f47e89900ebe7596dcb9226f596df3c4d3509db149decb6c4673d0ec68496e7ab7fa983f445b2de08688168"}, {0x1010, 0x116, 0x100, "7636d2f7985ed7221721cef9e26ffc32d50849383e3274090422d067998feb3af04e354d588fad079c421e80d4192fc32d1ce7522743c41206813134cec4d9bd02ff71ec3368d081a707a01b80b115b7b5593cdb686c7dab18892481a353e5569eed0de0727ea4898f197f27f117d238e9e051a575544fa4b32e3dd8faa94ee6ce1cf75c2c3c2cd6791d217353682ac0eee88b34f712f76eb774d4ead95670cc4abd6b113305722b8365ef94e5464bcff0402cb1703d5edb8affd96b3af024e4a48038d6d51ad637e4129f6e97ae5c1301a6c88e99c18a624acf56fb8f400fc43e68f246bf40ee658119687289ef578ad7edb40828f4de1c9f3fabd9549bcaa3a9ae41819aab2b88e34e23d1bd8126f7933e14f27ec5cb4e6fd760fc09e5d6ce23ba027d19d0e6ad2086db55f1487b3be1239e8049414be71a0c0b65575cd05498b85d19ecfff424bc388a40d300652cc5d9d2fe9bb0e3f9684ac7ca15c1a5e6c542486e0361c3ca051c27568e1a210700867e930092cb4116293252dcda4dac6cb200ded562c20aa6fba54c4230effea12c4c63d8bec948c9b1e4ebe143b9e01e4e6a32d930ad2269869c7c53586d53540e020a6822d4e8be99621a61008dc6bf13b9e10d2a6c4a6f8b0b94afa3ef6a8e1484c16db924c9f822180963edf42560d66398e9ccabb5f5c9c12a07a28a72d609ad8a85221b932f868f45627bde480b71beddd80c7a9f4c2659a3cb85739eae027e9ba0e7424417987983135ddb11ddae718b4877b21bdeb7bff9fcf4cc303bee4d2972b0af23fb568fb76a8e3431004960ad47cdd7329399b68e5a9d0eaf5c013ac5e5c286de09e13ebd0b126edb6398d06b5c72d3fa1b3743a93912f47bee0f7b87a0776bc8ecd683c0e57955115535d3d622ae99688435aa066b0c9d7bc9540528219975c88cd82f74111beef1fd131880cba93f714f69cd659cf6fa6f395a2ad29f57dbc5ac8e0840d038ae0b4062ee75890cab63023ec15432343977a711b82e355dce1f78ad63053dfe8abe878670b0fd9a909de719956c718eade30eeb0b5babe03b6229c9b39b81776ed42f411ae190f74d9ff91e1b758bad4acf8837232e1b36e8059f26929394f069181fe7d853b5761f2656b70710316f71ddb8a53d0a4dd2d9fceb34b24f390cb90b982e350c696116303c64c918a7c1190b1eb45289a225ea77713f720b292540b85d9e82d471104a692c2cb2fb3f32090119778a4e3028c142d27b334d8e0fe11735f18c955787258c4ec82b750960b53735f4b61c176d96b3748f9a01633c603634266df22815bd3200171802747648b4cad012b431afa3a8bb1633e22742dcc0b182c82d346321e1e2d3e4965af13faf91bff5ef07544dc28d35909e2e7fe0a52aa8ef8d91f767751a1df9a5362dfc2cead4e9496fc7e2594fcb0477b02b6ecc31791de48b5903a4e8c54507f3efcbc3e2324c830465e00c395c397c7619740ae24218315887805790aaba4237845af82ca3a9460dda4017496fc16bfe2695d1b31b3e27d6f888cec6ad5fbaf2c47e8f1446b9ba2f85f446b7cca92c948509247ddd922a951cc5379ecbe23e909dc3eebadc3a22bcb4556202a6afc5591b43e6b08a03d3c6e2439ffa927430415a3f1d06831aff4606aa21e2dd7f95033d92b58096a1fdeaefa02a4d2b1df59e72ebbd376eec52b4aef4c7133fd42414e352ab4c9b3b6f2704a9bee0ffbf6df51bbdcbcf2c0969a5a02b0eb76594c910b00395e46595189ea1bcd2f7373bfbaaccfaaafa2fd1102706c0f34e4a910bc1251ef93f0354b5f3af3832c31c31a16dab9aa8265c4cbd3b671faf32f006163fa2fa0c26d1a7d58fb0c8e34afbb06bb0af911c1b9a704e8e27a6f904f3b0f840c142e17e9d54a6e09d782731dedb33f9ac09a3bcbf77ea08125ab1987a48e1326098aed12f284ab27d25ee64d24135dadf55925ca00cad617e22655d305f772efab5e3d5932fef99dbdaab1a09b7e134cbf8fc8cee9550a6a0df2fd4ace1ae3cfb65d84b3b9084605c37e685acf626561c49b16ad31f4323d4661169c036471ade2a495cb9425d63ff1721f4c53b13561ee56b22d6ea6b97e8477c39134c4d7cd633f3bc5cc160f0cb2c79d7e2da9d2ac5e739899a82ad863455316192399e380b022ed06822f926e538c10a664d068209d9e9ca52b786649658f449f7ff58e34a6b4b2aef8981205d480183178760077e518ccb1bc1ae2add725618da99dfeb9155bbc50b280146f59dc116fe98e7263ded2db567e6c46ec3f7c7f335568b5e68783b1cdaa302430cb74377de813bd0fd247ae11eb22caf93895e4a9d4fb84f4ee937d475d16534e2d6b210187396fb88f2e1867ed93cc9d9f3231adb75b508c99cab18ca166c482e6ea5dc3466d372bb8b7a1e04f6bf0955a2eeb32fd88bac6041c68efcfdb560e90b05dd4cfec6e4decde52596dcfe11b8621ac7a48b952f9a0496f625aab04edb88410eae448ea8bcf43976d75b07679aec0e575677dedbbc7a68cf2a986c9d265ea25c7f87d71123c8399dbcbbd7a71aac4c00df8b62ead4b4258505c1de8a0d5438f40964f573a1163a7834582f214b6bff6717e197110b1435f260335f50e7af6a8d54d643abe53c4feb961b4f0806e9eb0ca80a5a0c45372d300a1cd973a7f6bae424d7c336f8119e976997df6962bcea337df4c0ddcb094b4c89f442dc7876d459fa090067e06b05d245c35f8ddbdbdba6c011b4583e6a717eda25b9da41012402f60e6e61126d596b8fb41f7ea2e0071f241599340b6a5da9474ea93c2f4307c1f564b26a01f39e679aaa5e33824e69353cc32dc099c2a379558675daec647d247f86c060279690848c7550502d0a5deeef5d81890e943f75065bbb649e8172bb4e7dcefb246de53bee6ebb410438c86293c6a2b63b6d25f3df1a1ed7bf3ba1123cf3e180cf40d6fc707059c7d2898e4c4057e1cba794d3973a9448fa4dc542e142b50b5cf8459dd0740eba94a51911fcc7f30e4ead140cb80d8f423441c8f45259ae8c63e52f0180e790816fcb9c3fb1e37cbb0ea2443c8d21eab73cb1643f01badefc3f2e58d5660d381e1f4fce8faff2d9f492bc9c3010fa4709552a9df1d93fa837f1456b20d8659f947dd109f45a59826dd7da4d8a340e91f72b35e558e5a15fe59659864b7b5b73fe3dc68e8da511adb4015339c8133800de4009355e82a8d2bfb6b37b482252914f4ecd107e5899348e89fdd3af5b9af8bd7fbfd3e69154c3cf3d1488b3446cc66510078d34a193d92a2e3debfce139a3cea44c0915146159ab81842193bbcfde2cd739d903459dd1227c846537fba620be344f13983c90cf009dbfe10baaf241fbe2e75c1c99592090c8d76114c868e1abe0f3477691849f043217e7b1c973e4375ce08dc9d3ddbb9961170bb40641c61b8ec403904915d8f05c24ddbc70e6500b03a8b1cb57e251f00753644a359a6d8806cfb95ce3863684dace0c87c72c4950103f16a999e499b47c28739b2af53e123b738bed19311db965e878e4f3cbeefb5ae71f19d6d9613db1a0a4d2d46f9d5076b39be788ae1114946d590b0dd6988dba1ce4db1f935c2bfd2024f923470c6c9150f11375670796a0f7563e3e0fb977605fc6f30ba7eef7daa77131fa93160394540e4f290646432b22db52978c97d750f3b63e51d88e1a4443279ae84145b8183bb6fe82cb5d31491315eac371f771ec3eac01889912580e32ff571205aea69a6459176a16281cb536bc9c03362422af19bba90958265640a03cdb91e492bcf698829f05c6bf3c68a1ed0724779a8ded18524fd1a0f7a497f1f774f6052e4b59c8eb920d0ceeaee84df134bf4454022d1fe1b623d6958432eedbc495566e7d91d93468034871fc9aac29f383bb76aeded8b23dd196ec2b5baa240606de832badbf2621d4b5d5a16c09750be00c8ebda044424bda62a3a4d1309d690555e0eeb7580dbe1ac7cb4e716841fd5ec2dc893d9b444b6cf7d4df70ee828a4dd007e5ac45b8ac946b8d845160f2ed8d6e9153ca22e1b360d7ba479764eaee8b976ad8e0865138e7249744cebf8c49ec7a91938629ba0f97b75ae72e1cc27085bb2e7631c0253e564b694f6d97e644c3d86bbfad2798fbaa44415759a1329ed5a604c96fb82ed00a6303a8da6133f8aa6f1069f5d09cc73dd7e93cc0ced8e9ae4536cfdd01b18fe0a0a0946478fca26738011133b5e584ec2e9db6854961b99da1ef35f57496723ac2dac89c199fa4377a8eca5e1fa20746bfe2d213a56030354ad60572e168fc53aa864950386694ec57e986d45e8a7d0325a5ddf4d053aba54e94948c59a026d110e77d72ddb865954ea6f12ecd01a7a3b47c4876e4046cf39dd518fcc9895e7d89b03ac7e9d375563bcb62cccc5e8e85f6a83e25f533c75c2bbf0707650a6a6272eb4fb4f170f8c5242425f4c56171cc44509565f2b9af91f9e623e4773c2f779f4efbdf855b007f3f328fd6f8b430e6444344f7dfc8e1d7dadbff13bc76c201f0886c7935f3c92a6d7e55bc26f780a8997e48ec02fc1c39ef2829a4acce1f939b08324fd6b99c5aa5b7230e8a033928f3f8afc764cf0ea715df9b758dcc509b144b52ec42e664efc2c39f4eb01e9fcb61181b68d8f43189c9368463e0bfa8ce05fb4b7401ac85a8cfd7c41ec531399c4a4f1e3a48ad5d9a1ba2424fbff1988af1d48e2ae60413effa50c1b46e10c4fc6695196b4da14dbc03cc37ca623605f014b016f4a0d887276a4cb3f0af065af46ab40ce4ecf0d953d9677921f3ed32435a9714489b0013d3eae85f4c4ab0e5cc0516bc80525a754da613dc7d02847c399893c1fda7f018726e8224be28c3a8274b7ebfe96110a8d18724dfd48ea4499b74c994a5eacc564f692ea522f570d799bc381fd163237f6095465fdb0d5edfa540de4c08784ce996cb83ae535ebc65d6ed82374f12463e57891ce8e333c85a8592426646aea893e612d48dc30e897794dc6ca5f31fe0bc0bf48b33587d812902ce09f37c9cd19fa09a332c5500a8fd7fb742bc1a4cea5bcbde9fb5c6cf5412d93ddfb49736ea14969b2dd6f83444ddc727a75ad88c9fa2b4de3045364ae04a87d72f31330bf2d9c84ace2a576d6a7cc5d2e6c4bc55d10dd1fe6fbe9558ab59057ab305444b81dd303d603bd7ab71f158e8388ce49b46a662687f75b9ed7082f6b483889a38b7f0c3f39741a97faa2730b5e10aa50213e3b647867eed48874032d78646a9bcd666e49ce9f1ac331d293f43b2ef8ad8b129810f70350b2d60d249850ced10415be9a485ba3b243d7f2b24f5d6443fc128dee27dee67268f8e330425e961bdaa13c67e8a18f3e09763af9ec8d63a450f8f7f6ec212e8493ad08a681c49e5dae7e90a298a4a47594ffe29c28017f6f579b80a8fc9c3d7d9241f3b9888ea9293d3e845008301ad3fc9097d05d2eda618664592297536a364c484e0f2127a949cbef18e64787e7ff654eaacaba0f2980a283c7ba3fecf320a16153982c11d5ac569db79dda9c38e84c79248a35499ed4df1a91bf8d380b0fac844fbe22d766273e9af36a1b22934e3c9b16de98bceeed63c8674f48f2b62a4e0849a3be0ccd5aa7d893a4d02fb762ef3a37baae7e36a3299952a404b150be49a666084d758fa8a8aec85146a6ebd80bc122dd860428c3f6bb7a98fb861383da9b9b8c4b7b6d3eb2fda9b4c64a1ad90ea38b57f83e4d2c2cd53e44da26aed8185e0ff23685d7b241265dfe99c6835deb9116a47a03c1b49fe674a"}, {0xe8, 0x13f, 0x70, "137816369589f6291ac03aa4d91240cf1d6be4e008238e0f48393355c0fa2ca5fe02f9b1ed3c19bc5eb86eb47c7afc83efabd6fc777ded7bb5936f34dbc8dd15d72b2432b21395f1c57d38a7b0c4a7577c5e895dd8d96c868208302437053fb626a978e53fa60b238a874eee128c6314d1f85f7fc414384518bd01fac8164fbec3ba83d00e5d4a6d22a4882b7c8b5b38bdc190cfd94da8f65eec28b6b376c668a086edb6558bbf49bc643d96d0314eed93df28aaf13e08e15be8dcc5f75c7b9d27fa0bb7e7d0e96da5c15cd5fe1390e2d2e38ef6172a"}, {0x1010, 0x13f, 0x422, "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"}, {0x28, 0x10b, 0x100, "6ce8d5114ccf0da3398e8bb093bf2cd091"}, {0x40, 0x116, 0x6, "543f98e2e65f959a1404715d80520b9f1ac1467aa8ec0ef870587ca4b7c2fcfebb237c11caf98f6cf1d0"}, {0xf0, 0x1, 0x7, "26ad5dccf1dcd26fabbb7d2b3e6c5903374ccbe9e02652b2af205ea23f29897ae68928a76344c2d162fd512b951763c1fc8708068814538cca230f2164edf7c1ac7aac7241f3c8a871266db6f4013d5a29b82b03e19f11db213f45eb566fa1397c9336160a289c79db8ff2348e6b453b70f9735b69889a205fb139756c739f9a9311613878a448a5690dbacd81c74d7a0295ad586510524e54e2dee637c0d9c77a2aec2affdc24546671781a4ef9fd91fa8c6d0d37c949ba48b72ccc9b292d0d2055b603b6c8c924cc0002e99f52d8ac6d184245e597bea22052"}, {0x28, 0x110, 0xfc1, "01613a74b6c9442dc6cdc481f5c0c73c61bef575ea5f"}, {0x30, 0x18e, 0x3cf, "5a33586639ec99864d172fe2473e87010caa19398dea353e1c115e46d33d5e"}], 0x23a0, 0x800}, 0x6}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000002fc0)="b214169907b0a9e47ede89814b65f4866e464780c4fac9c0ac40c175dc7adb3acc34d7b9f8f0675908bd60d73bab8f6ee63c983257cf70abeb5c5113379a4ef42d87ee53376b532dc4ef236b618d7777e8f24cfa3c7cb5ca70abe739bd2a91a51e15034f2783324f7dbb7ad7a63142a7a91c330beac1caf426cd140f780f826ae46c81db4c99d4d20d2bd60ce64716a363663833", 0x94}, {&(0x7f0000003080)="41e803a92c83d51523c3a47b5c49794e6b8e33f42f04b583f956ea91c7b66b07a8e29ef371ad5f21b1abb5bcc8788a6ff6c72dd1618afe4d0fb7af30df6ad0d80857ad5321b562c0767ce18eec59e9be09faf9196a1851697b6baacc416037fe58d270d094d3b62563b730bdb16a994b9e783986e6bbcc5bf31156cbd996056bcd608fa98211b856c5ed46f7339cf813099ad2ee1f42cd57adaa77ef54e5375cc15c3f092cc01cd2e121955df7d596f9fa25d1e67abb9adf10c69085407ecc83b6eec1762b71e9a2ca03b3155c1ca169ad8b1c2593abfe1d594e903b70061c846fa9a774a5da88d15482cb5c78f740316b2ea2614b268337", 0xf8}, {&(0x7f0000003180)="fb730fdb05190d7e24496850cfb1c4c21872a942ac97db7c150b65fc7a5dc82cb23629cb409be590c8a1886ac5d648abcd70aeee2be1705cc9e09cac3c4606122634e2c7836d88c2b93e6fc1c897c9ff675dab05f90515770309256c2b899a49e191d6f83c96b567115cb0fee8281e8bfd19416320d2d91a69b2e300cd27c5f1a4747aafc6116b3dbb7ba68209bcb206ccb6382f6ed7ec71d9236d75e7684636665267f55f4cf634593b3671af9fec3179fcfffe71eaab927d263d1e62a51f7f", 0xc0}, {&(0x7f0000003240)="b2c9b8d81e7dba65562f9125dd2a8cf028b101947842c290667011114b33da56e56115ed4d9201", 0x27}, {&(0x7f0000003280)="e98d254a33616e758d2c0a7eaf516af7b7901bfdb44867eb1cc87fb699e5747765a7d31333df6208c90931e985d7dfc7b8a310bd54ee5f0c1c", 0x39}, {&(0x7f00000032c0)="d335f6a19873cb7bdab95c1abe5760686fd3cb116ff37bb6b73178e251af846c42ef1e1620b287ed73ceb79a91985ecea08586652bfe01333d96a346e209bea486df3a8fee2e15a52b0a2464cacaa997161133f73f13af53b384490c0271cc8b161205b179dc81b91dfeeaa68d3e3d9e457af491c06be3e536861038c58440938f852eeb644ad422bf3b26fe5946109e728da0ed1b4ab873d933fe57435a7c2651dd628219d5dc305fef725041f25e043887c04a40e7", 0xb6}, {&(0x7f0000003380)="915cf612913efa537ae72b5d57087fd0d369effce8db6cd4cf6635e4607d7a2f6bbd2fd2cd36363ecc234c194dee12d24b426111edaffa7233c5853ef52d1392006218f68a7f5c5b6f7aa9ca6bb96cd9f5580c9739675562d25250ef29ae3c82f73ecbc465cc0643f7a41f943a4ff4aef762e410f411cf93c5273efbe1aefafd4ed3d1a710bda836f0553729ee1674dd7f423a215e1fc909835998571ae14bcff64bc0495b924b2080d60a3feae02001a2b02b7c5f3aac27c24f4bb88c03b69c", 0xc0}, {&(0x7f0000003440)="2e4ff87b0e07428c5bc0d340913b80164d3d8849b8fbb1b886ad2b66f8b777bdb3c1586c4e7076c90ba647d1b43d54d0305ec32f0a51aa8a470a7a51ab0fb683bc7eadd9abbb907dfc46b4a6eff00034e3836a6168c962", 0x57}], 0x8, &(0x7f0000003540)=[{0x58, 0x0, 0x8, "17a3457f052116da7a7a2edca8db644b5d735d2ec96c984245398414fa392f6a6960c86356aa1b1fb904bbb163ad6ecd42edc1df8bbb169e94c3bf576dfae5cb69"}, {0x80, 0x84, 0x6c, "ccf8cee37c58aeef5cb0b037043d15e37fad90abaab5073d8ce6cef5e1da60569ddad9f9438015b70ddb39ab6b623c8b5e7de314f2fe0024f20b2396bc052b110918aac4021eeb9245fdbba19852798502da00cc7d9c46d970fe3f7a7684537f13ef8d1d9800946c6e8a5df410"}, {0xa0, 0x107, 0x1, "9fe79c5357711d1b42875d586e7e8268b5dcbbfafb56fe495742fde9d94110032366c8c4984f95b543c2f91df253a04d51e9e02cea2d0028c5b92316f9e797b5c79947b67d970dc38cfcf6d0b3a544339a4fda89b3ae78852002578b9c3ad6df489f49c9a234acd555ed9834a3f12112a33e9ad2e04b61b2c3f5eb6921bdd5ed3de3c3956f672cae5455"}, {0x70, 0x117, 0x1, "1f409a2f0422487cfa08aa9fc20a4f7f77f46c5c8b1dde7a8d7b8213e188e23c794d275a3655b2fabf827894a68561ba492297e43976c55150131cb95f18b344f7d66ee4b007fac30b27804db04f8fb55e96f7ebd05f42c385d451"}, {0xa8, 0x18e, 0xffff, "5ca1d1d18f1970a3c13fd5ea92828be2bac8e8234dbcdd659e1aa879ef548ca8a0bddbfb9d072ac6b67daa119b915bbbb0697e617dd1ede393ba742cfa952ca811bc21bd26ad167503416dcef598503b75c5adaf340fca774d54631f241b0d3e4197ab3ef00249b57ec68696eee46027531a9a75b1eb2f92d49b71e05f819e0feaf241c1d04b9595475f4dd2ea1f245fd2a11f7c34"}], 0x290, 0x20000000}, 0x4}, {{&(0x7f0000003880)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, 0x80, &(0x7f0000003800)=[{&(0x7f0000003900)="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", 0xfb}, {&(0x7f0000003a00)="298582574a06523082c64e5fbfe4b06b8f19a764ba6849597ab70df9e40fd269821846f6589612261659f804d0693e2e869096f30d7e185a0286667ec1298ab834e9582861ab1fa974a985b0f2ca5b99c2a16ddd67a067b2c074fff3fbd17f83ce705151681c593672a2b128c3dc3b768e6fee573d0fd1c04cf7253bca914f65693932463535dac16a178b70a91ad7", 0x8f}, {&(0x7f0000003ac0)="e2d3b801f097e13d0add48520635a1a45ada23088aa604dbcb8cfc6158d8d75c12634cd17657cfe3194c63f200c0eb6adba9b6f06d7d1fb3362e3471a7d536300a66ff10085d7a3c5902acb8306e792fbcf84ac1ac001e885aac55e54412d4031cd86f1490262b4fccbadc5c84543853c5546f7334ee7470ad485792b6c6cd1988cb0cc8cdd8c671abaf8612fe4ae04004d7f78e03ba39d939ac09ce02132b5363dc8b9ff55ff800791d63a20a5daabb297a8893150650e83d35bec79f61c206135c230691ab21f320ca1793b73f955205e88e8b772e9ea6b5d12b92744c691205f27824", 0xe4}], 0x3, &(0x7f0000003bc0)=[{0xe8, 0x0, 0x0, "28169a45731f5dadc8b26af321eb62725a4336da873aca2001ab2c81d22801f75716dfdfa3871d48bd594aeb99954a79be4fd923267a5d6d1c2e33cb6a660ce5768a50d4a7a82bba998fe2694385ae3acaa29fc6528a448435d0b898b3fc03ac53146bc79303a4d2b15a5ca7e210712e2ca1d5bb72ff76dfee5e635beb110ac7ac2d0ff0f8e1bdedd004f1b425a07304a317a6441af8d016fd7e3251cd49c80a53e257c0316da06c62b476762ab134eba733c98381917fba850c34f9e5e082ed4c752a44fc4f9462a160dc0a2b291334b34f5a"}, {0xe0, 0x189, 0x4, "e6445d5d62753614727053dfafc8ff46583db7bf50d8e4f1e5ac9f9ae0fdfcf665af085d888a4a284f538e05a1e18a7bf476c73695b2a076a5c32b89dbf4ac55d5bb9bbcef5584fbe34fd1f376871b95c96fd4bfb6479263fb1d3cb92bc96e68059bca266c335a991c0f96df0a6e41f8d5fb3cb39a2295f49f50f6642032ceacbee180ffd77987bda1d0f4dfeb8fac45e1e5800c155c5e7440aeb0faad63dc84b4cc084faa5f6276db416beabfbc33c26d1d2bf9fe8648c8c4d63933f6f174100b4eae590714c13aab"}, {0xe8, 0x0, 0x1, "7153f2601eabaafa6f0f6da6e4a3e0f0e3f2f475839f19d967dbf1780cbae49fc5bc89bb6a289f601c7dbd605f637cd98823c38f025ed146d358210b9f23e36e106a26304efd851e1fdaf1ae12df875d15ae4e53931ecb1e58a869e3112749c98b94fc7eea4329c970f2a8ac3e34361ef14fcaabb9f05ee3f9ea507b556e5ce818bec28001a6ef041ae9872dc7b0e7cf57634a2e75310ab0ee674b9f16d77b0a8e434b7d29b4235247393bffd321ccfe12d6f90d41f2a168036058421e311f1924b7da5eb451dda37b2060bdb8ae3c39fc5f"}, {0x108, 0x108, 0x1ff, "26fe731ce273d1d9c0e4f7709eb62a223fa7e3a77bcea62f73835e651c9c3977234bd5f14e205a9e06bee0d7fecaa3d62ab0cde6dc1a8563c27d5b54cbb650b756d20c92b9ae6775fa7e0738ca36dc8a168291ccd5ad829c27166f650e31e201d2671ff02f67de87d275cfc505aaef55682e3650672a589def6ae8d295501c5f47cb2f90de31cfe412d9502b8ca24ec39414963eb6d8f9ce7fa5ca2a4dfcd3d55268ea6e4b62b30c527b60724ec3a7443cb3b9467b34f995731643e3cab1867320ee9e8fa73b2f1f5adda94bcf6548967c87846816cd95a67907b157e81ac67ac8989335a7899983e7b6cdf1de540498f4edbad5140c5e5a"}, {0x90, 0x13b, 0x6, "1dde99f9b734c454affec2c99a8815cd6af6cf7ad77b0df822f73be497429d639bcec479c2864f6be53504ccd5c8c7a71740d6b3c0c38e77e8b80f30d9fc3979faa4712e55012e93d46b23da5c3c1910de503ceaf2f7876a9ff734ad8acb5cf54b60fe4fa25b00a6f20c211679f843281832d9ba01b5dfd1f3cf3a9f8a43"}, {0x48, 0x10e, 0x2, "ae218554b56ffdec402c1c04ae09a834da52c87143216de0c247e7ad5b37512cf10d32da6412de994eb8935962cb27aac3236dab82f71b"}], 0x490, 0x40}}, {{&(0x7f0000004080)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x4, 0x0, 0x4, {0xa, 0x4e22, 0x7fff, @dev={0xfe, 0x80, [], 0x1d}, 0x2}}}, 0x80, &(0x7f00000063c0)=[{&(0x7f0000004100)="3a51757443e11bb0278f876103d3da2b2a08510ce5063f818d4816b3137ae11aeff64dba904fdf553c37c7d9", 0x2c}, {&(0x7f0000004140)="9d054e2983af277cf9f5e352d42080462524f10c90c6b51df5b7a279283b4826bad3de3fbdcf0df2d1c248ac88a921a9aa46dbdb2958728b68cebe646c3f9477c93ee112649952e12ed713b0b9cb58b6fba49d217ca5c82b0b81a33da5af90f38c924dc968d0ecc9afee05240b62", 0x6e}, {&(0x7f00000041c0)="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", 0x1000}, {&(0x7f00000051c0)="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", 0x1000}, {&(0x7f00000061c0)="779ee19e48278b3adefec4d5020f726d1f92fde161b8ef25e29c588e5d8b1796b5f020b0102c7446e6708feaf3595e31f1a85c2228c6405c10b54393cc5d4ff14bb0e52f57292eb5d14110431e532be26b13863d544de3d7847c645b1ac528efabf2632fd846d042810fe23d3c3e7c7ee7c86865e27bac4f24cdfd33553a3aa26529739658317737bb262b48", 0x8c}, {&(0x7f0000006280)="67765c6b9bd155dd74e2c01cfb364114c155873038b77212e08f049f199eb1e0c76d3ce6521bdea7c8cb5efe241565400bca691de3ba1cb95607fb124fe6cd19db9ba99e818621b047fe22ae5aa9e344fae24d9b1475085ec6b1090d6f0d6786cc527909a85bf18387e3995611fd6a219f3a81dc5d87436866c2ddaaedf747fd94c0c667c8e8eaaed194a60d6dc86ad7286616d5f04391cfea314a46393cc90b5c0b3a515852b981f2500ee49d1a94cac531d90ece5ef62b38ed4ad247a2a33472b8370006d0112fac591906e222fb078a0db785afc2ae82b5c60ba3", 0xdc}, {&(0x7f0000006380)="d22c6573099f26b3566d36", 0xb}], 0x7, &(0x7f0000006440)=[{0x58, 0x102, 0x9, "2d6df413c0e31809b6795123d16ff621d74090aa66841f16719c72150d4b741c215665518faace68fd1e8c330d64e47330bfa640a6ded7440a28163c0aa6ad39827c6b"}, {0x60, 0x115, 0xca7, "cf1c5af9da6db625ba368fae30d29e2153241cd7b11a12352813c705503c1b34bc2cb03683428c737c229a567d21fa31c73b25a141b4089141af8e078a328714746aea14dc8f8a18dc7b2891a5"}, {0x48, 0x10b, 0x9, "5ebab69663fe0776df0885bd1fc9bffb7e070a1f26a29bb18fd72351fe91a0bee21b01cff265ebf36ec4b4022e703aad3306dff330ac119a"}, {0x100, 0x108, 0x2, "08f29568261c0a99e767b2d465511f99016256a2881d862419cb9bf93cddc5ead953758fb6d21307f50184897ea95753af7559a7c4020900c61f508c12d2baa9a373425407859c4a9fc100f8dbe2b6eac49391ecca7e963c3c2a437341b522e31a16c08910dfa56f8829e6d2a138a9aa9288b5c424d53d966e7f4754162005b5c083969d060b9b6d70773199ff97cd1649763dd41c8d8174d3a6cf0d3f3a235c2a255dea0792637315106e04f10040d91df782ba5971a81542312dc0f20fefde70e6f657c43a441d643f59d30bda5793079efb90464ca28a5511e383d0d3cd6b8b6f90eb791ba55aeac8a6d8e12a"}], 0x200, 0x15}, 0x2}, {{&(0x7f0000006640)=@ax25={0x3, {"9b2b4ddd87f173"}, 0x6}, 0x80, &(0x7f0000006800)=[{&(0x7f00000066c0)="8ab773cabdcf3df1fbdc78369c05af9859d6ca6eb3adc36fde76d34c8d4a4bc263056e1d3bc08fe1e166ec2dbc76c97c9ef652aacb60fc0310d1d84ffce52bd99dcc9f7acc61bf0b4b0d4e44b5bfe6868d29cf66be513d883563f080b0a9429c1cfa78dbe940f5ace0b3b596dae5611bc1b4480106e8f54434b745c0d8fe7ca524cc321f08b31357108a91ce97ea8e419b7e4794ca0829f265e80366754de518faa0354d7427123810ad988cdab0683d8e533fb62d845986", 0xb8}, {&(0x7f0000006780)="8b279a5fc51599a776a58797d96671895c308426ec8cbc1b6601e18268d74681c21a07125f41e8ae09e6689a15d62226ee481a963389108f142af85f6eddc460f231457fd9fd78a7766e2d8d51970b4a4094d6191273414dd6c9c5451dfa", 0x5e}], 0x2, &(0x7f0000006840)=[{0x20, 0x100, 0x5, "4f5f524601c8d1de2e092edd65d46082"}, {0x108, 0xff, 0x9, "24fc827ee98357dcfad24c3e2d245ca7031ae28f6107a1e96c59f3b3bf23a906de8087ef8071efdbd861a201feeabd8e6f2d756f700892bc53fca2e1373e15843db5cb370df0c608f1f60b5307d1d2abb92648980e86278e4f5df6d28a8aa979a179062f10335e499e652e902b77a72b70c9321161bf5e53cc82c139936a2e135913cf160803db03c2f0f5752cb3a1489f1586982f457cb0230549dda2225bc7523c3602f9f0828e62f73b7d158f02542a6f8a6645991179cb0e2ae7912ae0485a6f5180934a6e9ba075b10ef220e541355e4ae36ffe3aa971aab6d6651e4c6e2dad1a123cde1c1568cf720c641d68d32a6cb90ff4e0"}, {0x38, 0x1, 0xe6, "d90e6388438c69ef04f4adb3d10beddcbf28d05b7074ca555d927f1a5b05105f8ed1555a1f"}, {0x40, 0x1, 0x9, "599f3856515e331fb24bb6d8754d8c340850d332e48dabc9229d35638f0ef4b5de00dcab1ee2d850c2"}, {0x108, 0x118, 0x7fffffff, "e712dae8e69a9b6b45163f498f002ea2d696ce859cd1d4c91e10db21e9c78dc4abed4b005300ad3576d06e508f2e1ac718170eebd148f6a83a3505b11eedc4e1b9b738f88f07338fdbab390ce909eebb7d97c3f8ab80c8df3fe48bdde86c2510bfb4b9c023b2dcbcc2736bda4886e8c39037c0cec822965a109a1abb44064af7f1591486d183d71c3f3296a3735bb96935783dbf9e7e3f16f4cf7e257b326b546818db480441cbdc63fdf0bb493caeea9d78b33becd8ccc954a0e5168bc6d938cf46ca9d021bec68ddbfaf321f22d3cf1f2b23e41cfcd5e9cf04ebb82a863f9b4b426e827f0492b8a0462bba3e372d38074410"}, {0xf0, 0x112, 0x100000000, "825a94a139b54b95573ff608ffacba1867e654efb4c3543f8d4f2a68c0462810871e234885a95dfe73d5c809cd6a90173dfc34b47f075450a38f6db5e5f28d45fa51d409dd17ddc8534ab00b08b06b45365cf03fdec748edfe05196554b3ad630f1ecbb1f60c9711af580ab68bb64eb19f36717f120d8da57316502ca17e345c56fecb9412c490b9180c87c33b625b598de22736d6c5a9d6cdb4be618d5ef5af91bc6325facb2196babd2b83d1d34feabcd29901295414136bb26d8ede3816b98e2f7de7e64fdc6189dbbb7585264cea10bda7ce80730facd1c3"}, {0x20, 0x10c, 0x8, "fd48394ceb6fe24eed6cbfe3"}, {0xb8, 0x103, 0x8001, "6041f934e0174591c14ad179c28214ef7f9cb69ac7990352b50516030ba827d75a520d0f0c49eabc4173c6939ebc75f939869119e56067d97c566737f514d6e823543dd6ba64492189df7ea1a489b3329d626ac3f269f11833ad5aa023de9036edb4c30635c2381d6fcb27c561e358441c58afe4b3dc06e6b4993693de6bdbce68e6d7757ddb764a23bc7f660d3adbe9e7be7c31ad4e236e16da80e40c87615241"}, {0x70, 0x10f, 0x5, "2f66cddc65a860f86e7767e46b0f53271ea64ce975f9a1b661b93f74fa7c8653c24d06f0cf2e26d86926bffe7c1f663eb6af7273bc9975d630c92d97e20116bc5552f7e6c911f5649e7f791835725d49bce7b78c0163b1cd12e7f14feaa867"}], 0x4e0, 0x4}, 0x3}, {{&(0x7f0000006d40)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80, &(0x7f0000006f80)=[{&(0x7f0000006dc0)="d1d3987fa3181ff711049709842d32df180ae76458e28f74a645fe253ebca024fcb21cead9e63c87cc772f4e0e7c0de89c516599b2fbc1e7557fdd4a4d449e74c486b96d63a5357b1e863fec607d1f9ca98c0d238f7c05ef3282addc9ed7f43bfa292e3a4394915241a3d73650688cbbd8aaffa2c3d3b6b0c9499fccb00a77a7a0f877f4f25eac5fd1115e493ce09f867c2b8579267754cbe27f0eb5ac1cda77", 0xa0}, {&(0x7f0000006e80)="4a33b5b7fb4180b02c6caf6bdeaa6cfc99604ff37a071f5bc8579d8215fd48b3790247688a7f435db1388b23ba790938ed81fe29c49b887283c2942f0bd599975715de7d71492de782a061d2ae2184a991c089c547f482347d8913fcffbe7fcbf0c4621fdc6a06de158c002c705e79a119f3b2c5f1badfffa327e3f96fc42407309da5ceff56f4336ae42252e1728cdfc985501f7f282db82983ef9453795e9b3713747ed6d6d41b93e414dea1c7798bd0706e4d5d5279d84cfc6cc70a58ea00", 0xc0}, {&(0x7f0000006f40)="397be96c093ff684375b14767f967238a8683a64f7150d0bccd6dc618a7d44685d6ae367ab0a90a27368bfd4a6", 0x2d}], 0x3, 0x0, 0x0, 0x4001}, 0xfffffffffffffff9}], 0x7, 0x4800) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 396.522397] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.596927] Error parsing options; rc = [-22] [ 396.652423] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x100e00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000200)={0x0, 0x0}) bind$unix(r2, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) sendto$unix(r3, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) close(r3) connect$unix(r4, &(0x7f0000000140)=@abs, 0x260) [ 396.699317] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 396.729355] Error parsing options; rc = [-22] [ 396.791078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 397.802220] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.808683] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.815793] device bridge_slave_0 entered promiscuous mode [ 397.822688] device bridge_slave_1 left promiscuous mode [ 397.828796] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.885827] device bridge_slave_0 left promiscuous mode [ 397.891247] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.039526] team0 (unregistering): Port device team_slave_1 removed [ 399.048771] team0 (unregistering): Port device team_slave_0 removed [ 399.058077] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.098162] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.178371] bond0 (unregistering): Released all slaves [ 399.250868] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.257331] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.264251] device bridge_slave_1 entered promiscuous mode [ 399.289918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 399.315017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 399.381655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 399.407419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 399.584816] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 399.592834] team0: Port device team_slave_0 added [ 399.629399] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 399.636760] team0: Port device team_slave_1 added [ 399.676100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 399.716952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 399.757167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 399.764256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.781421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 399.812702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 399.819880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.836243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 400.148482] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.154850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.161511] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.167909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.176501] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 400.275299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 401.009098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.086170] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 401.163588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 401.170095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.177970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.249504] 8021q: adding VLAN 0 to HW filter on device team0 17:37:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x10001, 0x0, 0xfd6, 0x9a3}, {0x8000, 0x101, 0x2, 0x7f}, {0x4, 0x400, 0x401, 0x3}, {0x1, 0xfffffffffffffff8, 0x2}, {0xbb, 0x2800000, 0x138a, 0x3ff}, {0xe290, 0x1, 0x1000, 0x4}, {0x7, 0xfffffffffffffffd, 0x7, 0x9}, {0x2, 0x2, 0xfffffffffffffefb, 0x1}, {0x10001, 0x8000}]}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) accept4(r2, &(0x7f0000000140)=@in={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x80, 0x80800) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x10000000000}}, 0x14}}, 0x0) 17:37:28 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf6ffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:28 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r2}}, 0x10) dup3(r0, r1, 0x0) [ 401.731287] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.741553] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.742372] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.754865] Error parsing options; rc = [-22] [ 401.764361] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.792693] binder_transaction: 2 callbacks suppressed [ 401.792710] binder: 26160:26162 transaction failed 29189/-22, size 0-0 line 2855 [ 401.810976] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.826519] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.836754] Error parsing options; rc = [-22] [ 401.841637] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.854453] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.876530] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.890570] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 401.896316] Error parsing options; rc = [-22] [ 401.909678] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.925027] Error parsing options; rc = [-22] 17:37:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="d4"], 0x1) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000002c0)}}], 0x1, 0x0) shutdown(r1, 0x1) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0xffffffff, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @rand_addr=0xfffffffffffffff9}, {0x2, 0x4e24, @rand_addr=0x3ff}, 0x140, 0x80000000, 0xbc, 0x401, 0x457, &(0x7f0000000100)='ip6tnl0\x00', 0x200, 0x1, 0x71}) 17:37:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000a80)={0x1, &(0x7f0000000a40)}, 0x10) r1 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="bdda76958e9af20a8bf0158b6e646336a0e1b8f12fa5628c2871ec4fb51e541803bb8ee271ac8c9ffb091492096e9f", 0x2f, 0xfffffffffffffffe) sendmsg$unix(r0, &(0x7f0000000a00)={&(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000640)="13f8ea50dae21463d28313cf5bf0b84ead2c5a7f661027885e0de6d87b3d84d18100b04c3ca37f3173e087413056a802953aa44bdb8c01f5b84175463bd253b0214e002c73bba5f19ae66e75b5c01c8cc1d429dcc3dd463faba93342dd2389ce58f79cd6e0468da785be3a0e5644804a8a81f867a300f9dfcae29e110eaab6097b34470ab7272ec4c0521ebca45e09c26fbc5c7a498ec7e5a24e4469bc2b08db08", 0xa1}, {&(0x7f0000000700)="8da2e76324075f0f91c684e8965cced828e7c08a22b95ebf6af07ec7959295e9e1e5160fc14df2f6c49ab8a82b218b4d64b46cdd2df89a063e36aedb1ffe5947ad6eedfcb212f05c1f8e3398e1c45204d225bfa36d7c9a2c4272fa4e7c348a7000ff29d77cd25a1cc0d88bee84c63311aeeaa3e702934c1c91b0118cdfc3c75df37729d2ea15037c87b053f905883302f90d6cf8abf7821c08ab54f28df7e1c8d06e4e3461701eb6eec289adf62a176921b1d0a765336b82b823903a0887a42b92d6065db9988be1c4", 0xc9}, {&(0x7f0000000800)="5c04381074f04ba91872bdc0555018749c00eb47dfbfc1e6dab18c3b40f64d4e9db2296d7825eef23dd0041599cae50f1606c98a4c283f412f55c60991a001a3feaf5d6342f5d94ce8ecbbc3cff4bfbde567579bc3d7514aac840792950ab8ac7d835553f063aa2cb577a29f17c6577bb67752e227d016b2abcc236a4c449450387a7dafca60836f307e2b2ab14a4a19d22b5147bbd1576375bd8228756926d4f337700dfae74f8b7bbd78a0bc66481d97617e5bde900f87eeff62e3ee31c501327b610dbf689dabe4a01ad4a1a4e1eb4f33b8deefc107f42722dceca33b11378555385fb980aae9d3ab", 0xea}, {&(0x7f0000000900)="0b649da5e07bf24c3614a32a7902c67371713e6763060b3cb95f656aa070071e49d0e3eb0d5074b3f422be89a0b3ee16fd52adae404cc7d3e1b479284ff7c80d93a76f9c9edf9d281e1689d8ab46b9d6b556a7e340e38c679267ebeb6298a32d1b6f5a9b9a853eaad09c5f0b23fb12074f3e4a3eddcffb9cbcb71c2d4b96153d4b1433e1c58e0d7a1e286b7fd3", 0x8d}], 0x4, 0x0, 0x0, 0x20008000}, 0x1) keyctl$reject(0x13, r1, 0x1, 0x3f, r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x101080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r3, 0x2a80}}, 0x18) r4 = add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="6bb55d09731c1751f8a8be8138274138bbd14181b4d0e2b33b275d0fc1d39fc0c808c25520d390159a02741118aa62b6f595af35167533063351acd1c8797983a294c77bfe498b61a7248493c2336bb8dd41a786b75a4508c869f53d150173988514426ed01e7bc6cf01b51329167aede2ae81213e618dab40739e10041b70ecfe8546f9d4f452756a4e771bc0edfae6a99c2ee8a3989337f5256e6dc7c3790fb1f7dc26870554970d2dd1dfb17949b277c428e4d59b22a794667967366584c7b364bf62f939fcd0facceaaf698921624e34d69fc72db6eec3bd0682c416a5b554ac2001bcc30d4b3156d96c6145cd9e2acf45", 0xf3, 0xfffffffffffffff8) keyctl$reject(0x13, r1, 0x7, 0xd5, r4) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000004c0)=""/208) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x4da, &(0x7f0000000000), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:28 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffff1f00}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x600}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 401.931518] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 401.934884] binder_release_work: 2 callbacks suppressed [ 401.934891] binder: undelivered TRANSACTION_ERROR: 29189 [ 401.979586] Error parsing options; rc = [-22] [ 401.984415] Error parsing options; rc = [-22] [ 402.027521] binder: 26189:26195 transaction failed 29189/-22, size 0-0 line 2855 [ 402.057253] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.066265] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.077144] binder: 26189:26195 ioctl c0306201 200005c0 returned -14 [ 402.084922] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.104289] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:28 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0xd8ab, 0x4e100) ioctl$void(r0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="116348400000000000000000000000000000000000000000000000000000b07a2052000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="00000500000000002738a3f676654bc96de68c9f27bd6ba63874f7d849af39fbabfedda13267adedb983a30a6e5a863fcb9d18746ab7812a470ff5662d401f0b303127"], 0x0, 0x0, &(0x7f0000000300)}) close(r1) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f00000001c0)={0x9, 0x101, 0x58f, 0x0, 0x100000000}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x7}, {0xa, 0x4e20, 0xffffffff80000000, @dev={0xfe, 0x80, [], 0x18}, 0x6}, 0x7, [0x6, 0x9, 0x8, 0x0, 0x4, 0x8, 0x2, 0x6]}, 0x5c) [ 402.138827] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.139752] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.155283] Error parsing options; rc = [-22] [ 402.181013] binder: 26211:26212 transaction failed 29189/-22, size 0-0 line 2855 17:37:28 executing program 4: r0 = socket$inet6(0xa, 0x800, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x200006) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe, &(0x7f0000000280), &(0x7f0000000100)=0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f00000001c0)={{0x8000, 0x4}, {0x7, 0x2}, 0x9, 0x5, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'ipddp0\x00', {0x2, 0x4e24, @local}}) recvfrom$inet6(r0, &(0x7f00000000c0)=""/46, 0x2e, 0x40000000, &(0x7f0000000140)={0xa, 0x4e21, 0x4eb99ee2, @loopback, 0x3}, 0x1c) 17:37:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffff000}}, 0x14}}, 0x0) 17:37:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 402.214211] Error parsing options; rc = [-22] [ 402.233071] binder: 26211:26212 ioctl 4040ae72 200001c0 returned -22 17:37:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080), 0x1, 0xfffffdfd, &(0x7f0000000040)='K'}) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000600)={0x1, 0x0, 0x2080, {0x100002, 0xd000, 0x1}, [], "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", "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"}) [ 402.268159] binder: 26211:26212 ioctl c0306201 200005c0 returned -14 [ 402.345790] Error parsing options; rc = [-22] 17:37:28 executing program 4: r0 = socket(0xa, 0x1, 0x8) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000100)='security\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x1f, r1, 0x401, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) sendto$packet(r0, &(0x7f0000000080)="8f2dbf497d1dd4896f6b773c7ee913fb45918b6b8869ea4aa72737e219da5b0381c32217b7476a20b14501fe20f0a020caacfbfc750c71ea839d9bb097aa6c0cdebe33b522ffd968b7ca2aea9e8432", 0x4f, 0x0, &(0x7f0000000380)={0x11, 0x1f, r2, 0x1, 0x800, 0x6, @local}, 0x14) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001040)={'security\x00', 0x4, 'VU`6'}, &(0x7f0000000040)=0x28) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 17:37:28 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 402.379685] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.398684] binder: 26236:26240 transaction failed 29189/-22, size 0-0 line 2855 17:37:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf000000}}, 0x14}}, 0x0) 17:37:28 executing program 0: socketpair(0x4, 0x3, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000140)={'syz_tun\x00', {0x2, 0x4e23, @loopback}}) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x80) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f00000002c0)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x3c, &(0x7f0000000180)=[@in6={0xa, 0x81, 0xfffffffffffffbfa, @mcast2, 0xb2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, @in={0x2, 0x4e23, @broadcast}]}, &(0x7f0000000200)=0x10) fdatasync(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={r4, 0x3f23d8ce}, &(0x7f0000000380)=0x8) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000100)={0x5, 0x2, 0xfffffffffffffff8}) sendmmsg(r2, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 402.421195] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.427630] binder: 26236:26240 ioctl c0306201 200005c0 returned -14 [ 402.438301] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.456562] binder: 26236:26240 ioctl 4080aebf 20000600 returned -22 [ 402.464035] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.486755] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.486912] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.520214] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.529795] Error parsing options; rc = [-22] 17:37:28 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x80000000, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 402.540331] Error parsing options; rc = [-22] [ 402.545703] Error parsing options; rc = [-22] [ 402.608783] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.633743] binder: 26267:26268 transaction failed 29189/-22, size 0-0 line 2855 [ 402.636867] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:29 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2002, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000140)={0x1, {{0xa, 0x4e23, 0x9, @loopback, 0x9}}}, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000040)=0x3f) [ 402.652640] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.660192] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.693209] binder: 26267:26268 ioctl c0306201 200005c0 returned -14 17:37:29 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 402.706037] Error parsing options; rc = [-22] [ 402.709942] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x4e22, 0x7, @mcast1, 0x3}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)="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", 0xfa}, {&(0x7f0000000080)="b5e8ba4f6863cde439d1525cd3", 0xd}, {&(0x7f0000000240)="7b70ca445a1ac88336269a6aaeda6c452ef8bdea8da6d4fdbf414344406887d3ef1c2b272b771cf126f650edc502050221a223997d13298ab940e13cc579b9599fd5ced831ebbbcc9a37c0d35115c2d9d459688096e2f7e2ae0dc446c34f65729ce9ecf707b9cf796b1a42329a897020240c168204f71fe2b8495d3db84494525280e84d0e1c360b5cc049327ac2033bdc6ffffee9a4ba37fd14caecfbe50da2a4e27c227af6", 0xa6}, {&(0x7f0000000340)="bb61906ec20d19beac9f6c09c50392361e2bf6e3099e89d0327a51020be8035493ef0ffe087139fb07b5c851f2e75107268f479cd07c9cfc6194d2a88facfd5af2daba6e37e1f168cbcc89ee2ff556b54819101410efa98028d994feb1c2bb36edd5a7e28aad2e5a49e2e5db4b13", 0x6e}, {&(0x7f00000003c0)="f27b2f306fd6fa292e0eaf3502", 0xd}, {&(0x7f0000000400)="2b54c67d270a3b7a310bd8ba7cec1dc11298943029e8f11237dc6c33568027444ab1cc0ad465499906c4f1fbc43fd4372c14688bba20e5d9dbdc4e603828c0b7ca4401865b51fef512c6d5342f95e44a194b711c131926711391258e84601660dc839960337708e1e497418935a6c331eef7e25cc6bbf51e4805e417b58a4fbc5c0c866bee06c9b057301b403b5e2297b2f6ada9372eebe0335bfd7b7e305aa5ed70ddb2ae31622d3fae93b10c96725319", 0xb1}, {&(0x7f00000004c0)="606ebb34163bc368418c470feda6d027dd2888d5f95543e711f052d4c64245c2b807600871540c1d450311c297e1f00146c492c806e87df67b41975558e5b923da126eeebce40a8f732eff79cf0563da3d9b834dbd1866762d57e30c61589446974d7d0233cd5800adf0ac6be1a524973ddfd0ac62a04039178f517aa11d65acb04fd513de60dfb97ffa666ea1daeed4d0e919a3c36883225df76a04fb0aad89594a6e291d3e3df126568c3437de4e771e", 0xb1}], 0x7, 0x0, 0x0, 0x4000}, 0x10000}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0xeba76318bd1dc55d, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000006c0)={0x0, 0x79, "64c94c801dca5c3a026338531d5e3679b8e3a6b4720400b24b7b4dcbc9bc6956bb86938951ec3ddeba3200e07da03fa111fce88bdec9810a04f7744c85e180acb364350453dc76b4ff757b190faf7b223db97aeb8e8b16f60d1909f465fad0d5866556ee2a5dd61a23b60dd6f1e07a548ec06bd6df773afc18"}, &(0x7f0000000780)=0x81) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r2, 0x28, &(0x7f0000000640)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000007c0)={r3, 0x80000000, 0xcf, "8f753800194a8b21fc4e566338c67bf6b51341be07a940605102f54e7d262183a713db0b99b8f9baacf212720859ead00b5eabcb1248b1739e851ba4a99558c188d59494c5a034f6f8bade43189ecdcb0e775f1047f32576c4fbcf3f82ebaa68acd1b8036c539bab11483d2a070b976ecbc7c51b74f039ec3f1f04bb1a625905a6b73ddb80027c7e931a809ef092b03b689337f0ce4d9389c6d87e7597553b7d07e7ea0de296e2bcd601707f9b44b368ef4f0de25b27c016179508f0fbfd1e825479e49332623413b587e303175eaa"}, 0xd7) syz_open_dev$mice(&(0x7f00000008c0)='/dev/input/mice\x00', 0x0, 0x440001) 17:37:29 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xa00}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 17:37:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x9effffff00000000}}, 0x14}}, 0x0) 17:37:29 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x5) r1 = socket(0x13, 0x5, 0x4) socket$packet(0x11, 0xa, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x400000000000003, r2}, 0x14) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dda9e8e5c837adf9f5ba429bb0c9c28c6006f52600303a00fe8000000000000000000000040000ffff0200000000000000000000000000010200907800000000600a07ec00000000fe8000000000000000000000000000ffff003d4a000000000002ffffac141400c382fae7f017fabfe55adc9886d34fb6d7eb40f541b0133e632135bd62715707a0d4ef3f432b5bad3bb4b08fbce6849918a84a0eb73208955ab4017b12414c0cbe9a78e4e57998732ffb11800e7bd835b67901d9770a11fb"], &(0x7f0000000000)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0xb9, 0x1000, 0x2, 0x3, 0x3, 0x4, 0x7f, 0x9, 0x5, 0x6, 0xf354, 0x100}) [ 402.771712] Error parsing options; rc = [-22] [ 402.780806] Error parsing options; rc = [-22] [ 402.819041] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.838086] binder: 26282:26292 transaction failed 29189/-22, size 0-0 line 2855 [ 402.875385] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 402.889040] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.898931] binder: undelivered TRANSACTION_ERROR: 29189 [ 402.906474] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x10000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000000140)}}], 0x1, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40800, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) bind$xdp(r3, &(0x7f0000000280)={0x2c, 0x2, r4, 0x2a, r3}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000140)={0x0, @aes128, 0x0, "634c572fbca99365"}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000080)={0x10001, 0x1, 0x6, 0xfffffffffffff001, 0x5}, 0xc) [ 402.906783] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 402.918960] Error parsing options; rc = [-22] [ 402.968611] binder: 26305:26306 transaction failed 29189/-22, size 0-0 line 2855 [ 402.979886] Error parsing options; rc = [-22] [ 402.991479] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.002263] QAT: Invalid ioctl [ 403.004297] binder: 26305:26306 ioctl c0306201 200005c0 returned -14 [ 403.012953] QAT: Invalid ioctl [ 403.016799] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.044091] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.045525] Error parsing options; rc = [-22] [ 403.063842] Error parsing options; rc = [-22] 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000340)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x90000, 0x0) 17:37:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\bd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) listxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)=""/160, 0xa0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000200)={0x10, 0xffffffffffffffda, 0x2}, 0x10) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)=""/172, 0xac) 17:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}, 0x2}], 0x4000260, 0x0) 17:37:29 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x100000000000000}}, 0x14}}, 0x0) 17:37:29 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x20000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 403.158459] binder: 26325:26329 transaction failed 29189/-22, size 0-0 line 2855 [ 403.168036] binder: 26325:26329 ioctl 4c05 20000340 returned -22 [ 403.174740] binder: 26325:26329 ioctl c0306201 200005c0 returned -14 [ 403.192735] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) socket(0x3, 0x3, 0x5) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80, 0x8, [0x8e, 0x40, 0x5, 0x800, 0x5, 0x8, 0x83, 0x7]}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r4, @in={{0x2, 0x4e22, @multicast1}}, 0x9, 0x0, 0x0, 0x3677f54e, 0x80}, &(0x7f0000000240)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 403.216627] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.228639] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.239937] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0xaaaacc7, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x500) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000140)={{0x8001, 0x7ff}, {0x0, 0x5}, 0x8, 0x7, 0x40}) [ 403.255409] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.272045] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.286757] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.297020] binder: 26338:26341 transaction failed 29189/-22, size 0-0 line 2855 [ 403.298005] Error parsing options; rc = [-22] 17:37:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x4a050000}}, 0x14}}, 0x0) [ 403.345447] Error parsing options; rc = [-22] [ 403.351757] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.371969] binder: 26338:26341 ioctl c0306201 200005c0 returned -14 [ 403.381796] Error parsing options; rc = [-22] 17:37:29 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:29 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf6ffffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 403.393640] Error parsing options; rc = [-22] 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000040)=0x7) 17:37:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/114, 0x72}, {&(0x7f00000001c0)=""/132, 0x84}, {&(0x7f0000000280)=""/120, 0x78}, {&(0x7f0000000080)=""/40, 0x28}], 0x4, &(0x7f0000000380)=""/5, 0x5}, 0x40010000) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000440)=0x0) recvmsg$kcm(r2, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/137, 0x89, 0x5d}, 0x2000) sendmsg$nl_generic(r2, &(0x7f0000000700)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800101}, 0xc, &(0x7f00000006c0)={&(0x7f0000000480)={0x228, 0x38, 0x114, 0x70bd29, 0x25dfdbfb, {0x1}, [@typed={0xc, 0x44, @binary="2a5d5326bd79da7d"}, @nested={0xe4, 0x2, [@typed={0x8, 0x7a, @fd=r1}, @generic="fd09e468a52a0848dba7b023f068ba471105606e78034bfc8379f1e4ee67c22770abf7422a41c00417d7f5dc2394c74c3a9439744efd88aba0f37f7511970fe65f4fa233a81e9809189ba30989c5278b8048beaff656d85a9b0f5089d3415e127ae645c7f7cc13035d04c433aa0d85d7c65954397f0e1def181c13bf679a67095e44e6860fca650ffe82bd49f43e7c091c7b5a88e6f70697dc12712612d7e79f935347d4ff06521d58087f3954f06874381b2041cb32510e24d12441e036161af3f2fe50e6f9df835376772dba7157059e4dd2861fbdc108"]}, @nested={0xe0, 0x2d, [@generic="8b725124b8d53dd6e8352294ecb59982c22e24ae37be856cc6dfd82ac7fbba5aac2db62fb3fa96e7f4de79916c6aba60b1ad31cede54b64e334939620fe3154e808f8aee235bd1253ade1e7f92888895c21f29f3cbf204df15ff352cc1b9c78be01fdaac82ef9257cccc4054b87ac5ff7ebecad8bc1228b0002a18dd723ffbad4ef19aef80402152ed39b200966b37f5e2de658b2a706493c4355613231881ca0ea98ce1456016cf9b875ad43fe8961dc59c2d38990636527f042b2218b68335875935fba71d9d2096113517e1a63a4659cda00b513ad375b1"]}, @generic="4336571a8f6e289b33b84f01cdda9c01d13ba283531f9fbce43ab57fa9c72daa168925c34af171e66b8938c32ad618f09fa10b21f0e2928babe4", @typed={0x8, 0x31, @pid=r3}]}, 0x228}, 0x1, 0x0, 0x0, 0x20000000}, 0x4044004) [ 403.441589] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:29 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x20000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 403.480370] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.506971] Error parsing options; rc = [-22] [ 403.528794] binder: 26365:26366 transaction failed 29189/-22, size 0-0 line 2855 17:37:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r2 = open(&(0x7f0000000040)='./file0\x00', 0xed6aa793980edcec, 0xa8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x80, "97cc5bcd510b3d460bd1590f844fa69739b0a6fe5431258261584cffd23d405a4ce4498f79a9ccee83c1cecc516337ab13e5687cc768b8170619a2e42a3dbf8a769cda92790b1dd3805823a0e90df675a9b1f9274b6f2f83a31588cd7d7dbacd9a99ac53f54055e016e97d09f3e5b1573f8c42d5fc1eca0a1c9f874f4aca4809"}, &(0x7f0000000080)=0x88) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={r3, 0x2}, 0x8) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r4 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 403.546376] binder: 26365:26366 ioctl c0306201 200005c0 returned -14 [ 403.554238] binder: 26365:26366 ioctl 2287 20000040 returned -22 [ 403.566521] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000fc0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000001000)={0xd3c, 0x2, 0x8, 0x80000001, 0x9, 0x8001, 0x200, 0x7000000000000, 0x3ff, 0x3396fe38, 0x9}, 0xb) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x9005}], 0x1, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 403.591546] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.603757] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.622236] Error parsing options; rc = [-22] [ 403.636944] binder: 26376:26378 ioctl c0306201 200005c0 returned -14 17:37:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x4a05}}, 0x14}}, 0x0) [ 403.643634] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.647731] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.681042] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:30 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x700}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 403.692349] Error parsing options; rc = [-22] [ 403.703430] Error parsing options; rc = [-22] [ 403.717462] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.736841] binder: 26388:26392 ioctl c0306201 200005c0 returned -14 17:37:30 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:30 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="116348400000000000000000000000000100000000000000000000d200000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000180)={0x0, 0x200}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x8) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000fc0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000001000)={0xd3c, 0x2, 0x8, 0x80000001, 0x9, 0x8001, 0x200, 0x7000000000000, 0x3ff, 0x3396fe38, 0x9}, 0xb) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x9005}], 0x1, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000002e40)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) [ 403.797504] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.828526] binder: 26395:26396 ioctl c0306201 200005c0 returned -14 [ 403.840273] Error parsing options; rc = [-22] 17:37:30 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x600000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 403.858974] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.878242] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.892986] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 403.895014] Error parsing options; rc = [-22] 17:37:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf0}}, 0x14}}, 0x0) [ 403.931884] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 403.956871] binder: undelivered TRANSACTION_ERROR: 29189 [ 403.989039] Error parsing options; rc = [-22] 17:37:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:30 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xc00e000000000000}}, 0x14}}, 0x0) 17:37:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x8001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x400000000000002) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x200000000000000}, 0xc) 17:37:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) ioctl$TIOCCONS(r2, 0x541d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:30 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 404.402302] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 404.449307] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 404.466053] binder: 26430:26431 ioctl 541d 0 returned -22 [ 404.487426] binder: 26430:26431 ioctl c0306201 200005c0 returned -14 [ 404.496127] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 404.526345] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:30 executing program 4: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@ethernet={0x0, @link_local}, &(0x7f00000001c0)=0x80, 0x0) sendto(r0, &(0x7f00000000c0)="b5acd5b7380e1f154b05738ad69f60f90973b5af26f5325aa6899cd73f95357ab70876f06a21f593b70330a638b227034e61762b8e127b022fe9810e7524ece219cbe04cefa18bbf511b34cdc511b8d3a30a43429d2f61fc1c30a8aa85b04b2ccd41a51e", 0x64, 0x800, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @rand_addr=0x96dd}, 0x1, 0x4, 0x0, 0x4}}, 0x80) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x9, 0x20000) bind$vsock_dgram(r1, &(0x7f0000000300)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r4, 0x80047453, &(0x7f0000000080)) 17:37:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000040)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 404.554493] Error parsing options; rc = [-22] 17:37:30 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff7f00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = shmget(0x2, 0x4000, 0x78000000, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000340)=""/4096) [ 404.632481] binder: 26451:26454 ioctl c0306201 200005c0 returned -14 [ 404.639106] Error parsing options; rc = [-22] [ 404.645738] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 404.659025] IPVS: ftp: loaded support on port[0] = 21 [ 404.668848] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 404.686176] Error parsing options; rc = [-22] 17:37:31 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext={0x80, 0x3fa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000640)) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r1, 0x4d) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f000040e000/0x1000)=nil}) r5 = getuid() ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000440)={0x0, 0x0, 0x86d4, &(0x7f00000003c0)=0x7f}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000300)={0x90, 0x0, 0x3, {0x0, 0x1, 0x1, 0x8, 0x9, 0x0, {0x3, 0x1, 0x0, 0x0, 0x3ab, 0x1, 0x7f, 0x0, 0x0, 0x81, 0xe8, r5, 0x0, 0x7000000000, 0x4}}}, 0x90) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000540)='/dev/dri/card#\x00', 0x0, 0x10800) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000400)="0f01df0f00d8c4c3615f2d1c3400009e0f72d105b9b10600000f32f30f013e0f180f653e6666660f3a21922cde00000edfd20f236a", 0x35}], 0x1, 0x40400000000000, &(0x7f00000003c0), 0x0) 17:37:31 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x8cffffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x4a05000000000000}}, 0x14}}, 0x0) 17:37:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x6d7, 0x8}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={r3, 0x101, 0x2, 0x101, 0x7f}, &(0x7f0000000200)=0x14) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x6, 0x7, 0x1, &(0x7f0000ffc000/0x4000)=nil, 0x9}) 17:37:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x440802, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x15, &(0x7f0000000080), &(0x7f0000000100)=0x4) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 404.803591] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000140)={'veth1_to_bond\x00', {0x2, 0x4e22, @rand_addr=0xffffffff}}) open_by_handle_at(r0, &(0x7f0000000180)={0x64, 0x9, "14433216f3b9b5271490ac5921874fbcf98f098791bcf14a79e4ab6af4229df69e0ec324c6ccb2cfb8085b60a5d807b3c8becee0a3b20b15cde9c33c77d2e7178267993a277fd278ca1f6896c33c818ef534e7c5c0571eb5f2ba7703"}, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_eeprom={0x4f, 0x6, 0x6, 0x47, "424a24af8476bb4bdc5eb2fa7e5676fd6f10cfa59440985c6feffa723d4ce27cca3fbdffd83d77336b52bf1b504a53e218c47ea6f2133647f860028d0935d0d08e19b7266d5add"}}) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 404.878491] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 404.897182] binder: 26481:26482 ioctl c0306201 200005c0 returned -14 [ 404.935848] device bridge_slave_1 left promiscuous mode [ 404.941368] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.956625] Error parsing options; rc = [-22] [ 405.035787] device bridge_slave_0 left promiscuous mode [ 405.041265] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.103554] team0 (unregistering): Port device team_slave_1 removed [ 405.112822] team0 (unregistering): Port device team_slave_0 removed [ 405.123433] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 405.148217] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 405.219099] bond0 (unregistering): Released all slaves [ 405.690453] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.697400] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.704589] device bridge_slave_0 entered promiscuous mode [ 405.742681] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.749452] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.756710] device bridge_slave_1 entered promiscuous mode [ 405.794865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 405.833184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 405.947720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 405.989087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 406.140339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 406.147505] team0: Port device team_slave_0 added [ 406.172227] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 406.179714] team0: Port device team_slave_1 added [ 406.219772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 406.250025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 406.276048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.301145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 406.308220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.316636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.531943] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.538349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.544934] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.551356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.558714] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 407.344783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 407.385370] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 407.428565] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 407.506081] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 407.512209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 407.519461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.592721] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.080748] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.091030] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.092863] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.104151] Error parsing options; rc = [-22] [ 408.114820] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:34 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffff1f0000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1163484000000000000000000000000000000000001b00000000000004000000d25d5d6c00000000000000000000f80000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000580)={&(0x7f0000000240)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)=""/194, 0xc2}], 0x1, &(0x7f0000000440)=""/234, 0xea, 0x7}, 0x2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000005c0)={r4, 0x1, 0x6, @broadcast}, 0x10) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000180)=""/141) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0xfffffee8, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:34 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x300}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:34 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x132, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x410000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x1) 17:37:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x400300}}, 0x14}}, 0x0) 17:37:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4880c0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xb0ee, 0x24400) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 408.131358] Error parsing options; rc = [-22] [ 408.167431] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.180308] binder_transaction: 7 callbacks suppressed [ 408.180338] binder: 26759:26763 transaction failed 29189/-22, size 0-16252928 line 2855 [ 408.205093] binder: 26759:26763 ioctl c008ae05 20000180 returned -22 17:37:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x300000000000000}}, 0x14}}, 0x0) [ 408.213865] binder: 26759:26763 ioctl c0306201 20000040 returned -14 [ 408.219737] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.233729] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.249783] Error parsing options; rc = [-22] 17:37:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x25) 17:37:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="116348400000000000001000000000003997ecaa00000000fbffff30aa016a4d0948271be508d8b3d3a64e1d68ffffffffff000000004bcf3cb03df572", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000001c00000036"], 0x0, 0x0, &(0x7f0000000300)}) close(r1) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x8, 0x100) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x2) r3 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$can_raw(r3, &(0x7f0000000180), 0x10) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) socketpair(0x2, 0xf, 0x3ff, &(0x7f0000000080)) semget$private(0x0, 0x0, 0x200) rt_sigprocmask(0x3, &(0x7f0000000100)={0x4}, &(0x7f0000000140), 0x8) [ 408.263551] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.271972] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.287251] Error parsing options; rc = [-22] 17:37:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x40, 0x401, 0x7ff, 0x10001}, {0x80000001, 0x3, 0xffff, 0x60}, {0x6, 0x341, 0x5}, {0x722, 0x6, 0x45b, 0x6}, {0x2, 0x7fffffff, 0x100000000, 0x2}, {0x2, 0x9, 0x2}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:34 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 408.322838] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.367391] binder: 26781:26783 transaction failed 29189/-22, size 2111808703468931301-281474976710504 line 2855 [ 408.384990] Error parsing options; rc = [-22] [ 408.406731] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 408.408275] binder: undelivered TRANSACTION_ERROR: 29189 [ 408.422886] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.433571] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:34 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x40, 0x401, 0x7ff, 0x10001}, {0x80000001, 0x3, 0xffff, 0x60}, {0x6, 0x341, 0x5}, {0x722, 0x6, 0x45b, 0x6}, {0x2, 0x7fffffff, 0x100000000, 0x2}, {0x2, 0x9, 0x2}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) open_by_handle_at(r0, &(0x7f0000000040)={0x80, 0x521, "c6cedc994c7a36a59ba95ea34cfefaee5b1324b3603da49d683610daf8a97c2bbf359a06ed56f782d1744a059209bfe99d5d7e51eea1d837c99e971e208f24dd032e42cae3e781d15ac297fa1802b0b993a4914e1fb06ca72d5701f699f7c637c8d7208346c70c59d9f86315578fe0999df60b1de98c77cf"}, 0x80000) r2 = dup(r1) ioctl$RTC_WIE_ON(r2, 0x700f) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf}}, 0x14}}, 0x0) 17:37:34 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 408.465280] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.485676] Error parsing options; rc = [-22] [ 408.498532] Error parsing options; rc = [-22] 17:37:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6, 0x0, 0x1000}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) capset(&(0x7f0000000080)={0x19980330, r2}, &(0x7f0000000140)={0x0, 0x100, 0x3, 0xfffffffffffffff9, 0x10001, 0x6}) [ 408.577108] binder: 26804:26807 transaction failed 29189/-22, size 0-0 line 2855 17:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xb0d, 0x101800) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000040)={0x2}) sendmmsg(r0, &(0x7f0000003840), 0x0, 0x0) [ 408.625746] binder: 26804:26807 ioctl 700f 0 returned -22 [ 408.635968] binder: 26804:26807 ioctl ae45 3 returned -22 [ 408.643470] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.652271] binder: 26804:26807 ioctl c0306201 200005c0 returned -14 17:37:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6d643000e1487a00c8eb5d2a0e38f301bc33ff35d2acbaaa652501fffe58fd2e8eccc104316d004956bbcce3432157bd9cab2b384ec0e1a4b50695a8a035e5f98e4dfc626c6f2fc3d67d328a960555ea3939ee727980ad704f30ccf80c"], &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='btrfs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)="5ed0840ca3863484211cf81d43d8e49e6d535dc1f6a9a3d7cc676eab2f1e030c820cf709026f4d8f54f0892e7ecb4b8ed081ceb204cff4974424180afd9753909330685acbcf6069799fa0a6c0aefb1ad48bad5cc984483ab9d3f25da45ee033439367fdbdbc9931a4baac1453cd1d4b1ffdc6b7e75b2d0e7c24c1de7838e8d14388305e954aeb93bbb0de7885d0cdf26508841e096a588c46a28a0170afc508fc39d60a737614ac7dd75c93f93e46616ad05b575ca587f4d46e24023cbb39e3f1b378b1") setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000380)=@sha1={0x1, "89b7f46fb239df7b384f7cb27808f1dbb13a22af"}, 0x15, 0x1) 17:37:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000110000000000"], 0x0, 0x0, &(0x7f0000000300)}) pkey_alloc(0x0, 0x1) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 408.671878] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.697728] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:35 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x10000, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, @perf_config_ext={0x4, 0x401}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="63defa93ceaad5fb0dede1482c347a71c4030771b87e908abf88001d1c0a9369f9f24b714aeef06baf204923dd581b99bc56a441533e35541b914519144fb39cd283c23cbaf817388556fd8725d38a62e30a8ac2d0edd1bf4daea2bf5adcec4a720b63b545f05b65d8fa1aff9db4889f4db90a3a4febac8e38e8218c14d7a509254904be6b1300bb90c8c01facb14760045c5fa44e7cbe1d8b5b85f5e76144dc143f5fb7069c02d8c059a1029fc1ce000000000000000000000000000000000000"], &(0x7f0000000a40)=0x1) connect$rds(r1, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) clock_adjtime(0x2, &(0x7f0000000300)={0x7, 0xffffffff, 0x80000000, 0x7, 0x4, 0x0, 0x3f, 0x800, 0xfffffffffffffffa, 0x26, 0x4df, 0x7ff, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5b19bdf7, 0x3, 0x100, 0x6, 0x9, 0x5, 0x0, 0x400, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f00000007c0), r3, 0x2}}, 0x18) close(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000000), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0), 0xffffffffffffffe2) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000a80)={0xe, 0xf6, 0xfa00, @ib_path={&(0x7f00000005c0)=[{0x21, 0x0, [0x5, 0x9f25, 0xaaeb, 0xff, 0x10001, 0xfffffffffffffffc, 0x10000, 0x9, 0x20, 0x5, 0x0, 0x3, 0x6, 0x5, 0x8000, 0x810000]}], r3, 0x1, 0x1, 0x48}}, 0x20) eventfd(0x100000001) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2c) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000680)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000540)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) r5 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1ff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc4c85512, &(0x7f00000000c0)={{0x9, 0x0, 0x0, 0x0, "1a0ab9b1f94c716787e88fae5552770ad6a9b54e0679918e0a88af8aacaea63fd56d1dd99812e16bc06df8b8"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0b690d49b85ec254b15b023d1e67900f8f559391133c552dd1c76c6e91f68e364a3238b17109db386e75830a143c5755ae184895c461436b09000000258c32a1"}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000bc0)={{0x0, 0x1, 0x9, 0x8642, 'syz0\x00', 0x9}, 0x0, [0x695, 0x6, 0x401, 0x1, 0x7fff, 0x9, 0x8, 0x114f, 0x1f, 0x301, 0x0, 0x80000001, 0x0, 0x9, 0xaa5, 0x1, 0x7b1, 0x3, 0x2, 0x10000, 0x6, 0x0, 0x1, 0x8, 0x5, 0x1, 0x3e9c8230, 0x80, 0x7fffffff, 0xe57, 0x3, 0x3a2e, 0xffffffffffffffff, 0x40, 0x7, 0x3, 0x97a3, 0x7, 0x3f, 0xcb, 0x1, 0x9, 0x846, 0x280cdf1b, 0x5, 0x33, 0x9, 0x14, 0x8, 0x3, 0xb69f, 0x100, 0x9, 0x8001, 0x8, 0x1, 0x3ff, 0x0, 0x9, 0x8, 0x85, 0x8, 0x3, 0x1ff, 0xff, 0x1, 0x8, 0x6, 0x5, 0x4, 0x6, 0x200, 0x400, 0x100000000, 0xff, 0x6, 0x0, 0x7ff, 0x7ff, 0x80000001, 0x0, 0x1, 0xe9, 0x7, 0x1, 0x9, 0x2d77b1ad, 0x0, 0x0, 0x1, 0x9, 0xc0000000000, 0x1ff, 0x1f, 0x2, 0x9, 0x20, 0x2, 0x6, 0xa01, 0x3, 0x1ff, 0x7, 0x8ec4, 0x9, 0x100000000, 0x6, 0x58, 0x9, 0x682cc081, 0x3, 0x4, 0x7, 0x9, 0x1, 0xffffffff, 0x815, 0x80000000, 0x5, 0x40, 0x10001, 0x7fffffff, 0x40, 0x2, 0xffffffff, 0x3ff, 0x5, 0x8]}) 17:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffff0}}, 0x14}}, 0x0) 17:37:35 executing program 0: socketpair$unix(0x1, 0x25, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x200000000000021b, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'team0\x00', @ifru_flags=0x3800}) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 408.740265] Error parsing options; rc = [-22] [ 408.749213] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.770760] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.778592] binder: 26831:26832 transaction failed 29189/-22, size 0-0 line 2855 [ 408.824565] Error parsing options; rc = [-22] [ 408.829985] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.832852] binder: 26831:26832 ioctl c0306201 200005c0 returned -14 [ 408.855872] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 408.874540] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 408.887756] Error parsing options; rc = [-22] 17:37:35 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000000000278772fa5fc46a6201378534a4d54c611d0afc6aa8f9e495c4a08be69c9bf5b2449c4ad6f0c3924fad72d8706406105db8298602e0a271a795c27b1bdd7e35ba079b583ec30c78d9621420375b86edb7d56e76b7ac3bc024f1db9c0506dd83d90c5dee26aff8f59c7b1476b961371423d64591e1b3ed1c17ed2382d8cf86a877408e527ec2cbf9ac070fd4f752c9d99c17a69c32b42b1b3b7fef143aa7ef"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xc02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @loopback, 0xfffffffffffffffe}, r3}}, 0x30) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="9615dab700e655c15083cb6ca2a985ece142223cdb280beb69feeef84d8ba1f87734e29b8f735f2386169b05b021237dc16aa022478c86eb4222380b9d8adfcc4c4bcc26", 0x44, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 408.932284] Error parsing options; rc = [-22] [ 408.963568] binder: 26853:26854 transaction failed 29189/-22, size 0-0 line 2855 [ 408.985389] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf0ffffff00000000}}, 0x14}}, 0x0) 17:37:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x33e) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0xfffffffffffffff7, 0x9, 0x0, 0x9, 0x7}) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000002500)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x20000002, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000100), 0x2338, 0x4008000, 0x0, 0xb4) 17:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)="ce178295257f04fef0dab86d14a49668b970f47295c84aad51ce671711249e98cf8ad3cb21fd9f7799e6ad3984cc8ba3bcc80d44347fa7f0c81c70b0f2e429a879955c905f1e528cb50f500114c5eed3c5bb699ac1b4f5ffb14cf4c129b811eb5913525798ebca9f3b59bcfad500b6707cf140985e665e7138748ff065698f6cac9c96509a3459435013bdb0641d4e4b494f8cfa945e87fcfa48d148d4853932d0098ba52677a1bf030b867cdebfac302318f3fec23189d2c533955b6e1043d4efee79ba5a90fc350ef0abc8097592f7ecfeb8a993ef4b95c42888355cfd8fdc92d4", 0xe2}], 0x1, &(0x7f0000000340)=[{0x100, 0x10a, 0x0, "e0e353013b01185596404ba7a044b68a321db4050c212771a8f74565c832dbc857aa5b4ebdf0f4278a5d55ef75e57285b5af27b43bef6b3e1baae0e78a956dbfe10014c4d30b3af55134fe2b4f8e8c2e34d56533319daa9f5c90ad12f241d9514aa7f0e73a091d93efc4ae60e77209864a770278fa132f7c4b4b632953bc7277c030b745f7b0d0b0e61edc69c5e827ba833ccffd243956970564d4bf09aa2756101da8c97c33fd14a7f8b3ee14143731c4ea91fc1111912e0bb46d43ea141ea09dac1db84cfa17e75b910d8880f896d0db60acad216fba9ee48dcc3a0611d34fece41a7fd279173308203765ebbf4613"}, {0x100, 0x108, 0x5, "ce82e82a74521be3c40796dffe8839d24754441c01317406bb9b54e791c368d861acee50253198cd545a8f2e180c916f97f092f0692b52fc3a46ebc21d137b3e26620611996234f055d26f40c2dbad6054b67d726962ba0aad27b47fe9f57a82af24e563917792a05bee074d4c3826d6213ca6d39afa1a3419be727d5f882191df9e66cdfc16a0ee03e8f6eb90db79299c19ca4165e0100f8fbb8a1118ae6f2780048aa249b4b35d3f04dc4159b9fe87cd81456ffb8e51ff8ab2055adc514fa15d0704ef28da250589a6fa96d3c6862ebd01610513cc2f8bf7c06f0fe5e6e28696eac98255f94d415752ec46"}], 0x200, 0x800}, 0xdad}], 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)={0x0, @aes128, 0x2, "d4703c4d03d6e717"}) [ 409.008185] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.026065] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.043453] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1163484000000000d1d6000000000000000000000000000000000000000010000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 409.065548] binder: undelivered TRANSACTION_ERROR: 29189 [ 409.071316] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.085553] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.100693] Error parsing options; rc = [-22] [ 409.102794] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.136883] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.153195] Error parsing options; rc = [-22] [ 409.168762] Error parsing options; rc = [-22] 17:37:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000040)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:35 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 409.187690] Error parsing options; rc = [-22] 17:37:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xc02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @loopback, 0xfffffffffffffffe}, r3}}, 0x30) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="9615dab700e655c15083cb6ca2a985ece142223cdb280beb69feeef84d8ba1f87734e29b8f735f2386169b05b021237dc16aa022478c86eb4222380b9d8adfcc4c4bcc26", 0x44, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) 17:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf0ffff}}, 0x14}}, 0x0) 17:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x7f, 0x10) [ 409.247304] binder: 26887:26888 transaction failed 29189/-22, size 0-0 line 2855 [ 409.294013] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.308034] binder: 26887:26898 ioctl 8070ae9f 20000040 returned -22 [ 409.311835] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.327202] binder: 26887:26898 ioctl c0306201 200005c0 returned -11 17:37:35 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x4080) write$P9_RREAD(r1, &(0x7f0000000140)={0x90, 0x75, 0x1, {0x85, "74114fc86db6288a6903ca947d1acb3a5402879102eb9ddcde9e35f1a456ddcad50f14042a2307746539ed6b25a6dd29ebf8d3581d8e7472634769a1873bd19218e1dc1c9d7328ca64a511ccf6941aa508ed46fc04eb3cfa0e2054a6dc4f0ef0c3c20fb7cfba6b131cdc69cfbfa43bcc20d4193c58088be0ceaa966233d28214ea6e1522dd"}}, 0x90) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0xff, 0x80000000, 0x1f, 0x1}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000000c0)=0x4, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000200)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000002c0)=[{0x10}], 0x10}, 0x0) 17:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x3, 0x5}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={r3, 0x7fff}, 0x8) syz_open_pts(r2, 0x40) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000022c0)}}], 0x1, 0x0) [ 409.359293] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.369637] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.390084] Error parsing options; rc = [-22] [ 409.397295] binder: 26887:26898 transaction failed 29189/-22, size 0-0 line 2855 [ 409.407840] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.427920] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.433404] binder: 26887:26888 ioctl 8070ae9f 20000040 returned -22 17:37:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x440000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000140)=0x4) r3 = socket(0x40000000015, 0x40000000000005, 0x0) setsockopt(r3, 0x100000114, 0x1d, &(0x7f0000c63ffc)="66014ebe", 0x4) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000340)="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") getsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f00003e9ffc), &(0x7f0000727ffc)=0x4) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000022c0)}}], 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f00000001c0)={0x0, @aes256}) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ff9000/0x4000)=nil, 0x1, 0x3, 0x80, &(0x7f0000ffb000/0x3000)=nil, 0x9}) 17:37:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\fr']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x4, 0x10001, 0x100000000, 0x9, 0x5425}) read$FUSE(r0, &(0x7f0000003000), 0x1000) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getdents(r2, &(0x7f0000000240)=""/185, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_STATFS(r0, &(0x7f0000000100)={0x60, 0x0, 0x4, {{0x0, 0x0, 0x1}}}, 0x60) [ 409.464382] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.477609] binder: undelivered TRANSACTION_ERROR: 29189 [ 409.484392] binder: undelivered TRANSACTION_ERROR: 29189 [ 409.490663] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.494887] Error parsing options; rc = [-22] 17:37:35 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="11634840000000000000e0ffffff000000000000000000000000000000000000000000000000000000000000000000dfff000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="e7ff00227900000006801816e070b0fb86f56555a27bb3528370dc5ef472ab1c4257810049afef6b3f3d62f4e3521ad74b5b9a64cb42a37fe27b9d741cfdeb3d1088ef1671abc4bba330a4fd798ba63206109eab38beba7c97328d1c4068dc2d5be99fa48c993fc10df3178d4cbd2192dd41ce5e89be877eea0295ba146868a417e18de5015ab3818700e5f4700f326a01898a3b3c"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x96, 0x1, 0x10001}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={r4, 0x62, "61f89981fa6d286c802a6bb7ba7467b4723f44dffe13f7c009d2e8718534e551002779523017fb61334b37c886d6682ea2f2ad9bdc20ce5e1ecc7e2a8c967283b2a213848c1555d09be2251b267a8085410050997f660e3b7ef14b03badbaba59723"}, &(0x7f0000000180)=0x6a) [ 409.530780] Error parsing options; rc = [-22] 17:37:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x1000000}}, 0x14}}, 0x0) [ 409.566680] Error parsing options; rc = [-22] 17:37:35 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff8c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 409.589977] binder: 26928:26931 transaction failed 29189/-22, size 0-1098957979648 line 2855 [ 409.608366] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:36 executing program 0: socket$inet6(0xa, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66643d872b25eb2f97ad879a16b9a53015347e2a8df9db7cff73367368a6cfe028cda50df4913d1e75d32558c5dc630207cf7ecabcd9370c82fbd3344d29997b6a8bd20a5ef4f9c438366cd0d468ce1e3a1307e046e61c78591bd8", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="050006000000000000dd02775db2f3486905088e1f9b8e6bb616815d058c3629033a726ea772f336409432ebbed0b56271d429115933c461d3ab18e9efc802cc6c5ae9b3dfaae443ffe164833390bdd7e0c099be71aa649addcef3e2f85a07d1714fe5302fc5671f00f42ad38972b294546d9cb0881e79344a773173715ea62f1f080f8f2dc5f9f5e7bf592cfd0ec3a79fc1de6dcab1fb5c944037d668560863bb8cafa23da1e86855ca5afd2f1ed71bd904513c5f51a6fe4646dab55d69984fd089938fcb15d26d03fd5854449a9c390200000000000000a4f536babb63c8c600000000000000348d83cd3a4e99e5fad7cf75b041df7c0c39d792a6482e2c3f7f411030d296"], 0xe7, 0x1) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x1000000008000000}}, 0xfffffefd) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000240)={0x6, 0xb34, 0x7, 0x5, 0x1000, 0x2bf, 0x101, 0x80000000, 0x5b, 0x2, 0x101, 0xe29}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x6c, @multicast2, 0x4e24, 0x2, 'none\x00', 0x10, 0x100000000, 0x31}, 0x2c) r2 = dup2(r0, r1) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000)=0x10, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000280)=0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x8, 0x6, 0x1, 0x1, 0x0, 0x1ff, 0x48000, 0x2, 0x8, 0x5c, 0x1e, 0x2, 0x7fff, 0x0, 0x1, 0x100000000, 0x7, 0xffffffff, 0x100000001, 0xfffffffffffffffd, 0x8, 0x200, 0x0, 0xfffffffffffff001, 0x0, 0x57f3, 0xeda, 0x0, 0x3ff, 0x8, 0x8, 0x6e, 0x5, 0xa, 0xffff, 0xf65, 0x0, 0x959, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x8, 0x8, 0x7, 0x2, 0x5, 0x3ff, 0xd6b}, 0x0, 0x2, 0xffffffffffffff9c, 0xa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180)=0x10001, 0x4) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 17:37:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x8719, 0x0) bind(0xffffffffffffffff, &(0x7f0000000680)=@ax25={0x3, {"4a158a9cc76254"}, 0x8}, 0x80) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)="7ff6d735cd872ec8846648e86ada609c437295eb2e333f551a4ee89f2fd432e1b2b7c4ec24e3e1ad31ff7c616079447d1fa2c69a6d2f697594638ed054d2ca6521") r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0), 0x4400) fcntl$addseals(r1, 0x409, 0x8) signalfd4(r1, &(0x7f0000000200)={0x200}, 0x8, 0x800) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x80, 0x0, 0x6, 0x8, 0x129}, &(0x7f00000004c0)=0x14) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)={{0x4}, 0xff, 0x0, 0xff, 0x3}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0xa80b, 0x20, 0x400, 0x100}, &(0x7f00000002c0)=0x18) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfb, 0xa0000}, 0xc, &(0x7f0000000940)=[{&(0x7f0000000600)=ANY=[@ANYBLOB="f846416514de936a1bba9762a8b2b79b80fee6375bb868f9b0fca2f77744bef9c69689da91903c411659e89db34e2e8101972176c00d7eee2b435beca919f2f6cbc02f3a8bc510ba703082c5c88e08840c7516a1445dbc56b0aa6da36a7cda904bd5499a9ad824be35"], 0x1}], 0x1, 0x0, 0x0, 0x81}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=r2, &(0x7f0000000280)=0x4) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000900), 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000004700000082fc7c36ff7466e690b9322920db93e6de62254c39252e561307b66ffafd6abbff9e092afc48669d93aa9c0e4b29ceb6bd3e0861ddbfaee29eaf1b257b0ffbb8914112b9edfa8c"], &(0x7f00000000c0)=0x6b) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xa, 0x800, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r4, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) 17:37:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80, 0x0) accept4(r1, 0x0, &(0x7f0000000080)=0xfffffffffffffe84, 0x80000) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1163484000000000000000000000000000000000000000000000000000000000000000000000000000000000007ff85f7256fcd3a98c754fb82ff9c3a11fc5952fe887616d85218654ac21ee0a65a5e3f11614de78c27314d53b8eecb4b546bef6bdf050a6f297649d03b6dcb0200d15162f3d787309e6b6bf2524d313d7ce4493812ce986127b23f85085391c3f2db4d3eeb8a11ca5dae0edb6f78c8e560351568617f7a100000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="d3abd87b4c5f498a7d8e82ffffffffffff56cac7da"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r3 = dup2(r0, r2) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xff) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$9p(r1, &(0x7f0000000140)="9bcdd23b3bd29de2dbb0aa96579e9b3278201b1a7e2dd7f698ac0587857c1784ecaf46d7c24baff536024cc712e4a777116d6de5b8363af1c61e16f86d9fc1872e70b0d5f2864c9970397df5c26853ef2d3b4ae3c4c11dc4f02d22227e8d1956426de0d65ac06bef7dcd16b4e2d0e39bb17e16877a086e2c6760817ce18f279493733f4af7e41990670e8fbed547207257738b", 0x93) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 409.682117] binder: 26928:26931 ioctl c0306201 200005c0 returned -14 [ 409.690847] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.704793] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.709451] Error parsing options; rc = [-22] 17:37:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 409.745986] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.785922] Error parsing options; rc = [-22] [ 409.786271] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.795566] binder: 26953:26954 transaction failed 29189/-22, size 0--3171564988339290368 line 2855 [ 409.818069] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 409.832876] Error parsing options; rc = [-22] 17:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x2000000}}, 0x14}}, 0x0) [ 409.839807] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.854320] binder: 26953:26954 ioctl c0306201 200005c0 returned -14 17:37:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 409.936626] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xffffffffffffffff}}, 0x14}}, 0x0) 17:37:36 executing program 0: socket$inet6(0xa, 0x6, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66643d872b25eb2f97ad879a16b9a53015347e2a8df9db7cff73367368a6cfe028cda50df4913d1e75d32558c5dc630207cf7ecabcd9370c82fbd3344d29997b6a8bd20a5ef4f9c438366cd0d468ce1e3a1307e046e61c78591bd8", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="050006000000000000dd02775db2f3486905088e1f9b8e6bb616815d058c3629033a726ea772f336409432ebbed0b56271d429115933c461d3ab18e9efc802cc6c5ae9b3dfaae443ffe164833390bdd7e0c099be71aa649addcef3e2f85a07d1714fe5302fc5671f00f42ad38972b294546d9cb0881e79344a773173715ea62f1f080f8f2dc5f9f5e7bf592cfd0ec3a79fc1de6dcab1fb5c944037d668560863bb8cafa23da1e86855ca5afd2f1ed71bd904513c5f51a6fe4646dab55d69984fd089938fcb15d26d03fd5854449a9c390200000000000000a4f536babb63c8c600000000000000348d83cd3a4e99e5fad7cf75b041df7c0c39d792a6482e2c3f7f411030d296"], 0xe7, 0x1) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x1000000008000000}}, 0xfffffefd) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000240)={0x6, 0xb34, 0x7, 0x5, 0x1000, 0x2bf, 0x101, 0x80000000, 0x5b, 0x2, 0x101, 0xe29}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x6c, @multicast2, 0x4e24, 0x2, 'none\x00', 0x10, 0x100000000, 0x31}, 0x2c) r2 = dup2(r0, r1) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000000)=0x10, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000280)=0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x8, 0x6, 0x1, 0x1, 0x0, 0x1ff, 0x48000, 0x2, 0x8, 0x5c, 0x1e, 0x2, 0x7fff, 0x0, 0x1, 0x100000000, 0x7, 0xffffffff, 0x100000001, 0xfffffffffffffffd, 0x8, 0x200, 0x0, 0xfffffffffffff001, 0x0, 0x57f3, 0xeda, 0x0, 0x3ff, 0x8, 0x8, 0x6e, 0x5, 0xa, 0xffff, 0xf65, 0x0, 0x959, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x8, 0x8, 0x7, 0x2, 0x5, 0x3ff, 0xd6b}, 0x0, 0x2, 0xffffffffffffff9c, 0xa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180)=0x10001, 0x4) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 17:37:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x4000000000000000, 0x5, 0x2, 0x4, 0x0, 0x5, 0x2000, 0x2, 0xffffffffffffff2f, 0x3, 0x5, 0x8673, 0x10000, 0x1f, 0x1, 0x2, 0x3f, 0x1ef5, 0xb8, 0xffffffff00000001, 0x0, 0x3ff, 0x0, 0x101, 0x401, 0x6c1, 0xffff, 0x3f, 0x4, 0x7, 0x100000000000, 0x100000000, 0x1, 0x94d, 0x3f, 0x7886, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x30, 0xfffffffffffffff9, 0x7, 0x5, 0x100000001, 0xafd3, 0x2}, r2, 0x5, r2, 0xc) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000080)={0x3, "e64a65"}, 0x4) [ 409.982036] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 409.997870] Error parsing options; rc = [-22] [ 410.001578] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 410.065600] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.093292] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x1fffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:36 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$int_out(r0, 0x80184153, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) [ 410.117282] binder: 26981:26984 transaction failed 29189/-22, size 0-0 line 2855 [ 410.126817] binder: 26981:26984 ioctl c0306201 200005c0 returned -14 [ 410.136158] Error parsing options; rc = [-22] [ 410.141079] Error parsing options; rc = [-22] 17:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x54a}}, 0x14}}, 0x0) 17:37:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="116348400055a9000000000000000000000000000000dbdde960d59a97000000004ff0000267cb74fec7e8fc317d0728de290000000000000000000000000001", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 410.197553] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.260873] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.295698] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.306028] binder: 26999:27000 got transaction to invalid handle [ 410.317207] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.323412] binder: undelivered TRANSACTION_ERROR: 29201 [ 410.339271] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000000280)=@md0='/dev/md0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f0000000240)='posix_acl_accesswlan0keyring/nodev#*md5sumcgroup\x00') mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='cramfs\x00', 0x2000, &(0x7f0000000100)="760001b076") r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000080)) [ 410.352364] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESHEX=r0], 0x3c9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x141000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)) 17:37:36 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 410.383864] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.422816] Error parsing options; rc = [-22] 17:37:36 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffff1f00}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 410.441286] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.453503] Error parsing options; rc = [-22] 17:37:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x3}}, 0x14}}, 0x0) [ 410.485341] binder: 27017:27020 ioctl 8912 1 returned -22 [ 410.501711] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.523098] binder: 27017:27020 ioctl c0306201 200005c0 returned -14 17:37:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 410.540567] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.557451] binder: 27017:27032 ioctl 8912 1 returned -22 [ 410.562074] Error parsing options; rc = [-22] [ 410.574366] Error parsing options; rc = [-22] [ 410.575282] binder: undelivered TRANSACTION_ERROR: 29189 17:37:36 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:36 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = accept4(r0, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000040)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xb) futex(&(0x7f00000000c0), 0x3, 0x2, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), 0x4) recvmmsg(r1, &(0x7f0000000280)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f0000003600), 0x0, &(0x7f0000003680)=""/210, 0xd2}}], 0x1, 0x0, &(0x7f0000004480)) 17:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf000}}, 0x14}}, 0x0) 17:37:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="51634840000000000000000000000000000000000000000000000000000000000000000000000000bfb6ae9c0000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000080)=0x3) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000240)) [ 410.581399] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.595588] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.624751] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.674730] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 410.678758] Error parsing options; rc = [-22] 17:37:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) madvise(&(0x7f0000c24000/0x3000)=nil, 0x3000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) readahead(r0, 0x3, 0x76d) 17:37:37 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x3}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 410.716798] Error parsing options; rc = [-22] [ 410.728364] binder: 27045:27049 unknown command 1078485841 [ 410.730572] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.734146] binder: 27045:27049 ioctl c0306201 200002c0 returned -22 [ 410.746654] Error parsing options; rc = [-22] [ 410.753205] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf00}}, 0x14}}, 0x0) [ 410.798801] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 410.938550] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 410.938845] Error parsing options; rc = [-22] [ 410.998829] Error parsing options; rc = [-22] 17:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xec0}}, 0x14}}, 0x0) [ 411.037178] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) [ 411.085588] binder: undelivered TRANSACTION_ERROR: 29189 [ 411.091455] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.119475] binder: 27078:27079 ioctl 8912 400200 returned -22 [ 411.146104] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.169576] Error parsing options; rc = [-22] [ 411.174943] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.187800] Error parsing options; rc = [-22] 17:37:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x8cffffff}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:37 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xfffffff6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000005e0007031dfffd946fa2830020200a0009000300f01d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x8) 17:37:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) accept4(r0, &(0x7f0000000380)=@ll={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x80, 0x80800) bind$can_raw(r0, &(0x7f0000000440)={0x1d, r2}, 0x10) ioctl$int_out(r0, 0xc0305710, &(0x7f0000000100)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@local, @dev={0xfe, 0x80, [], 0x11}, @dev={0xfe, 0x80, [], 0xc}, 0x39, 0x9c, 0x7, 0x0, 0x8, 0x2000000, r3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, @in6={0xa, 0x4e21, 0x0, @remote, 0x20000000000000}, @in6={0xa, 0x4e22, 0x42, @local, 0x7ff}, @in={0x2, 0x4e22, @multicast1}], 0x64) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x9, 0x42000) 17:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffff000}}, 0x14}}, 0x0) 17:37:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e22, 0x8000, @mcast1, 0x3}, r2}}, 0x38) r3 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="00f8fffbffffffff"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000040)={0x0, 0x0, 0x3, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 411.213901] binder: 27078:27079 ioctl c0306201 200005c0 returned -14 [ 411.234485] binder: 27078:27086 ioctl 8912 400200 returned -22 [ 411.249878] binder: undelivered TRANSACTION_ERROR: 29189 [ 411.298893] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.315290] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.358128] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.376060] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.379263] binder_alloc: binder_alloc_mmap_handler: 27093 20000000-20002000 already mapped failed -16 [ 411.399346] Error parsing options; rc = [-22] 17:37:37 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x80, {{0x2, 0x4e24, @multicast1}}}, 0x88) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000180)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="9e", 0xffffffffffffff18, 0x10, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0xfffffffffffffe8f) [ 411.406363] Error parsing options; rc = [-22] [ 411.407699] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.411191] binder: 27093:27097 ioctl c0305710 20000100 returned -22 [ 411.422297] binder: 27093:27107 ioctl 8933 20000180 returned -22 [ 411.433868] binder: 27100:27105 ioctl 4020aea5 20000040 returned -22 [ 411.451148] binder: 27100:27105 ioctl c0306201 200005c0 returned -14 17:37:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xf00000000000000}}, 0x14}}, 0x0) [ 411.480142] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.510795] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:37 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:37 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x9) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000000)=0x7fffffff) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000040)={0x3, 0x8}) close(r1) 17:37:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getcwd(&(0x7f0000000040)=""/35, 0x23) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 411.544676] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:37 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000540)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000600)={r1, 0x7}, &(0x7f0000000640)=0x8) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)=0xfffffffffffffffd) prctl$getreaper(0x200000004, &(0x7f0000000000)) 17:37:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = getpid() ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000040)={0x5, 0x7}) sched_setaffinity(r3, 0x8, &(0x7f00000001c0)=0x19b) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendto$inet6(r2, &(0x7f0000000140)="fbcba19af8295f9726ff46fbc4278f5f004354190ac785ddcdc6977f710ecaf6c6ca919bb3dd", 0x26, 0x20000000, &(0x7f00000003c0)={0xa, 0x4e22, 0xffffffffffffffff, @loopback, 0x7f}, 0x1c) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000, 0x1}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000440)={0x3ff, 0x9d, 0x101, 0x365}, 0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000100)=""/19, &(0x7f0000000180)=0x13) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 411.598387] binder: 27124:27125 ioctl c0306201 200005c0 returned -14 [ 411.603101] Error parsing options; rc = [-22] [ 411.614675] Error parsing options; rc = [-22] [ 411.631283] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.653639] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.660940] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.683242] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:38 executing program 4: unshare(0x2060000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000240)=""/4096) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000040)="04c540f05815b5b0554de710f6d66586d2c8b7b297db9b3b0be8228eddf6c13b108caae6c741088c01c69f00863d7d26ee971a280e225bd4f48dc3bf4302bf82c5f7f7ec092b2921c9be9b6ce3a13dbc8ee69a204cc5305651b355bf73b60e63") 17:37:38 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x1, 0x7ff, 0x4, 0xb9ae, 0xbd, 0x8, 0x6, 0x3, 0x2, 0xfd}) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r3 = socket$inet6(0xa, 0x4, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r5 = socket$inet6(0xa, 0x6, 0x0) close(r5) r6 = dup3(r3, r5, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r1) r7 = dup(r2) syz_kvm_setup_cpu$x86(r6, r6, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000003c0)=[@text32={0x20, &(0x7f0000000340)="6764f30f2cec26a8c066b8e0000f00d0650f20a10f32b9a30300000f328fc978d2f28fc848a339062664660f38825e00b80d0000000f23c80f21f835040060000f23f8", 0x43}], 0x1, 0x12, &(0x7f0000000400)=[@flags={0x3, 0x20100}], 0x10000065) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_netfilter(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x12a8}, 0x1, 0x0, 0x0, 0x4}, 0x4040004) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:38 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 411.692081] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.698157] Error parsing options; rc = [-22] [ 411.741152] Error parsing options; rc = [-22] 17:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x5f4}}, 0x0) [ 411.796996] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.818091] binder: 27145:27155 ioctl c0306201 200005c0 returned -14 [ 411.821944] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:38 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000100)={0x0, 0x1, 'client0\x00', 0x2, "8f519f4b6947f566", "e933e30a447c2d2cb997d459c525f35d2d86e6c66d1f55034070e5569a8c3a84", 0x3f, 0x8}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0100008000000000"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r3 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000240)=[{&(0x7f0000000340)="b1db94e8d765f66415d37da26778035d9716b027a03550f398b2bcb81ca6f1eadc1640dae4a9cbe1b9452dd46a3d756c7251daad693f0692788ea111863a6ae6283ca707d7a76bee52d2ff895b2f8ea41df00e1cd4fe70a4f5b4c24f8cdbfd30f390c25725d181f9023217eb65171406a75636d922417d86c875197c36fc6b7a00df3a26d997a870342af646ec40f7511a8b98d3201d04f0e8bd0e005222e729053f9a6bbd52c9c4452bc26c665d7f7d0b6308959f1545861a1714a756af0a41cfef8a583c7f1f11ee2498299ee1a5d48561138363a387e9624c8ff62452a3b668d83da5f1a9cba1f5087a9b6d15f291ee6c", 0xf2}, {&(0x7f0000000080)="38cafcd07278dbeca125970beae798447fd7d4c642c014a9984cc622ca22e5", 0x1f}, {&(0x7f0000000440)="092b80f3e8eceb853ec01dbfc51c03cfc6118efd59a5ae770cbb5a02c6e5ead675bb06d89b6c8f888fff08e55d3ed86f7c5f2e93b2cd7ef743f064918184ee8b813233b0f8990fbc1e01a780c3d2f0ee36dea86aec32a0b477b10a61531dce974290d9e47cd6ec75c8ec8a6882cbf964e200a92b7f7574bca075a4deddcd71e80733e344174d50b3094ed7009d772b8b9a2c5968adcf708ba005ca53d812e40c0e838c5e2ccb9dd75b2ea35bdd0b010be5bb96d0c90a945056442002c477b39a007f22c6b45169b868ed58239b63051640c824d5163b09", 0xd7}], 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 411.893219] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.914152] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 411.919058] Error parsing options; rc = [-22] [ 411.963533] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.963974] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 411.991191] binder: 27173:27174 ioctl c0306201 200005c0 returned -14 [ 411.991716] Error parsing options; rc = [-22] 17:37:38 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="780000000000000005000000000000000000000000000000000000000000000000000000ff0300000300000000000000080000000000000009000000a4e7000073656c66657468305b00000000000000030000000000000036642c9e5eae8de95e5acacc1e01000000000000000b000000008000002f6465762f617564696f000000000000"], 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000000)=0x200) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) 17:37:38 executing program 5: syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x200) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x4, 0x7ff, 0x7, r1}) socketpair$inet6(0xa, 0x4, 0x2, &(0x7f0000000100)) r2 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840003f73000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) mq_unlink(&(0x7f0000000280)='proc\x00') 17:37:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x600000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 412.006718] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.023676] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:38 executing program 4: unshare(0x2060000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000240)=""/4096) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000040)="04c540f05815b5b0554de710f6d66586d2c8b7b297db9b3b0be8228eddf6c13b108caae6c741088c01c69f00863d7d26ee971a280e225bd4f48dc3bf4302bf82c5f7f7ec092b2921c9be9b6ce3a13dbc8ee69a204cc5305651b355bf73b60e63") [ 412.071108] Error parsing options; rc = [-22] [ 412.080090] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.088338] Error parsing options; rc = [-22] 17:37:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x62c}}, 0x0) [ 412.131233] binder: 27182:27188 got transaction to invalid handle [ 412.142911] Error parsing options; rc = [-22] [ 412.147552] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.147563] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.147590] Error parsing options; rc = [-22] 17:37:38 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x8cffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 412.197997] binder: 27182:27188 ioctl c0306201 200005c0 returned -14 [ 412.265714] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.282548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.300811] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400042) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000100)={0x1ffc}) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) getpeername$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000180)=0x1c) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r1) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:38 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff7f}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 412.312878] Error parsing options; rc = [-22] [ 412.313888] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.318384] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.342572] Error parsing options; rc = [-22] 17:37:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x304}}, 0x0) 17:37:38 executing program 4: unshare(0x2060000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000240)=""/4096) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000040)="04c540f05815b5b0554de710f6d66586d2c8b7b297db9b3b0be8228eddf6c13b108caae6c741088c01c69f00863d7d26ee971a280e225bd4f48dc3bf4302bf82c5f7f7ec092b2921c9be9b6ce3a13dbc8ee69a204cc5305651b355bf73b60e63") [ 412.408938] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.437827] binder: 27213:27215 ioctl c0306201 200005c0 returned -14 [ 412.446843] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.458143] Error parsing options; rc = [-22] 17:37:38 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='p\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 412.485574] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.502598] Error parsing options; rc = [-22] [ 412.526730] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.528240] binder: 27224:27226 ioctl c0306201 200005c0 returned -14 [ 412.560256] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.581245] Error parsing options; rc = [-22] 17:37:39 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="780000000000000005000000000000000000000000000000000000000000000000000000ff0300000300000000000000080000000000000009000000a4e7000073656c66657468305b00000000000000030000000000000036642c9e5eae8de95e5acacc1e01000000000000000b000000008000002f6465762f617564696f000000000000"], 0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000000)=0x200) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) 17:37:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='%cryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x1, 0x3, 0xfff, 0x3, 0x200}) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:39 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffff1f0000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xf}}, 0x0) 17:37:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) sendmsg$rds(r1, &(0x7f0000000600)={&(0x7f0000000200)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000440)=""/234, 0xea}, {&(0x7f0000000540)=""/134, 0x86}], 0x2}, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f00000007c0)={&(0x7f0000000280)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000700)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x200008d0}, 0x10) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000f, 0x13, r2, 0x440000000000) write$binfmt_misc(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="000000808e9478f65b2babac217968be4d00f9b8d6bfa96383d2e65d1e6055f4977f3c49fd034b"], 0x27) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r4, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x0, 0xd, 0x0, 0xf0, r0, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x400) [ 412.871451] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 412.921806] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 412.939061] binder: 27250:27251 ioctl c0306201 200005c0 returned -14 17:37:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='qcryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x5000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x0, &(0x7f0000000140)}, &(0x7f0000000240)=0x10) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)=""/85) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 412.966679] Error parsing options; rc = [-22] 17:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xc5c}}, 0x0) 17:37:39 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000100)) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/keycreate\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/222, 0xde}, {&(0x7f0000000240)=""/164, 0xa4}], 0x2, 0x19) 17:37:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='\ncryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 413.059142] binder: 27264:27266 ioctl c0306201 200005c0 returned -14 [ 413.086384] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 413.136515] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 413.149780] Error parsing options; rc = [-22] 17:37:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r2, 0xfffffffffffff801}, 0x8) clone(0x210007fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40505331, &(0x7f0000000200)={0xf}) 17:37:39 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:39 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xa}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='eqryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:39 executing program 4: ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000100)) prctl$setmm(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) sysfs$3(0x3) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x7fc, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x3, 0x20, 0x85, 0x80000001, 0x80}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)={r1, 0xc8, "159be6b6b06693a4dc99a9d4ba10c95b5292f7f13e5deb56ab3b6ae8576bfe464886a24b2b25fd5f3dac34436b03180d71c3e0b4c3e6461909b019ec663a227c95ac1b948f6b522bd0e77a1bdf377d71d8441dc86fb692ed92ea3e8d6eb3992b4984994cc4818c016cfb040b8cc5f69800d983b4fad6d1d47d39b440c3de7ce3a13f4999f65f628215812c3c62f6c3d0a9dfb69d1ea4aab1d5c799722242f65b8711e016e118a1c886bad0988c5ce50f1849a0e758bb3e2f2d962f3406b36ce5068cce05da61510b"}, &(0x7f0000000300)=0xd0) r2 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8, 0x612000) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000080)={0x1f, 0x5, 0x0, {}, 0x200, 0x40}) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x200, 0x0) shmctl$IPC_RMID(0x0, 0x0) 17:37:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x224}}, 0x0) [ 413.587439] binder_transaction: 15 callbacks suppressed [ 413.587471] binder: 27296:27297 transaction failed 29189/-22, size 0-0 line 2855 [ 413.604283] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:40 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='e\nryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0xfffffffffffffff7) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) gettid() ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0x81cd, 0x9}, {0x80000001, 0x6}, 0x1f, 0x3, 0x9a8}) r3 = syz_open_dev$amidi(&(0x7f0000000d80)='/dev/amidi#\x00', 0x0, 0x22240) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000004c0)={0x82, 0x964, &(0x7f0000000e00)="8b5d803c108db5d404ae14455706c80cf9dee63c1bc8c0bb84ae632c5a186d372a18d0126aaa24189783414f1fc11aefd3", &(0x7f0000000dc0)="8bf3bc7a45726de940", 0x31, 0x9}) r4 = syz_open_dev$dspn(&(0x7f0000000800)='/dev/dsp#\x00', 0x9, 0x208082) ftruncate(r3, 0x7) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000080)={r0}) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x65, "d4516eb4e733a4aa4fbf1123203b4b4820e2a0aa7d28d43582c31310f156f3ce01e02e70c791f99964dd21663e1e5dcea224823b41a2d87c1327b55d59f610dacb4d1a35f2610832ca6a33d9bdcb113829fc2da11ec3c83c3a4f06a5cb977c0c2f34932211"}, &(0x7f00000001c0)=0x6d) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e22, 0x1, @empty, 0x14000}}}, &(0x7f0000000200)=0x84) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000340)=0x3, 0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x3f) ioctl(0xffffffffffffffff, 0x7ff, &(0x7f0000000380)="89a6d5a0a38287d19bd10483a976b891a5fceb4d4b31bd70210a1f13f81f5e64fb6e01bbde3710da077c7afc027a2790ae6c64e757ca80ec6e6d834d0be64439c64b397a0bf41da6ac7b0301af571e52e4cd83de446e9a19") setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000f00)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40)={0x4fb9d853, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000a00)={0x1d, r6}, 0x10, &(0x7f0000000880)={&(0x7f0000000a40)=@canfd={{0x1, 0xc79d}, 0x37, 0x0, 0x0, 0x0, "f92e770235ad32d9a4557bdfb85878f3afe7dbc8cfbeb7aefe783f53361519315bff1ff612fe1c21ff0abdc1801e9b2d5cab6b6f1981b0b7c7d77401b39e26c5"}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x1ffffffc) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000c00)={0x100000000000000, 0xb74, &(0x7f0000000ac0)="ca88b1980fb78ff43e614aad36ddd0cdfdb264b19ad3497d49c4f8845540d97cf54c60ae2a936142a70d3c0a1e33fb6d0c96a2e2767e8df9e2146ac2450d65fb61e8b1b7a43c94dd65296be1d9cf275291675765f48f62203b43a6bb18e57131873af6dcd8fa8b12d342d1a837c2b001257dd409", &(0x7f0000000bc0)="b04b1ae8c69bbf14a914c59396c4fb9128db985d56", 0x74, 0x15}) ioctl$TIOCCBRK(r0, 0x5428) accept4(r0, &(0x7f0000000580)=@can={0x1d, 0x0}, &(0x7f0000000600)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000400)={r5, @in6={{0xa, 0x4e23, 0x7, @mcast1, 0x7c}}}, &(0x7f0000000780)=0x84) sendmsg$can_raw(r3, &(0x7f0000000740)={&(0x7f0000000640)={0x1d, r7}, 0x10, &(0x7f0000000700)={&(0x7f0000000680)=@canfd={{0x1, 0x2, 0x4}, 0x2b, 0x3, 0x0, 0x0, "c4ab159fe4c6f9334b0aaa7d0a01e6502048f801867fa80484cc1c08810a1f1ab648072c4d3e667471b7a6b15ba350e54064ce577e0b55f3b1925e24e93fa73f"}, 0x48}, 0x1, 0x0, 0x0, 0x400c080}, 0xbba9a960da639fa) [ 413.696655] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 413.712528] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 413.727592] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x6, &(0x7f00000004c0)=0x0) r3 = fcntl$dupfd(r0, 0x406, r1) r4 = creat(&(0x7f0000001840)='./file0\x00', 0x0) r5 = eventfd2(0x9, 0x80000) r6 = syz_open_dev$admmidi(&(0x7f0000001b00)='/dev/admmidi#\x00', 0x7, 0x2) io_submit(r2, 0x6, &(0x7f0000001b80)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x84d0, r1, &(0x7f0000000680)="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", 0x1000, 0x9, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x228, r0, &(0x7f0000000540)="7526b8f675e5ccbf746d418d99", 0xd, 0x5323e445, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x3, 0x9, r1, &(0x7f0000001680)="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", 0xfa, 0x7, 0x0, 0x3, r3}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x7, 0x7fffffff, r0, &(0x7f0000001780)="d7213ccfd556aeffdae29c8936d51364e79edacc668e35f6142656574bef1fe619f7f84f863de6dc525a85465ca3847bf132b96833ed2d0475d548d9557d0d0a879367cdb8b5288ad5dc875c30c193961acdf73ed4a9b921de0b31fa8d42efd7b8214287b5b0b40b289146e9e224f560b5fba2d49c987df5511f85cca81ae33c4e406e75503a64d2dcdbd07ae3f0899e24fbe89b", 0x94, 0x6, 0x0, 0x1, r4}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffd, r1, &(0x7f00000018c0)="8421212ed33c045da77bc579dccf235d470264bfc75ca6aa8d00500aad4c87b2cfa3e2a7ddff34718f9e173226df489e3efe8bce16a0e9690ee7d987fbb59b47866c1da7c0bd9f5677a3a047d7274901bcaaedc04ffa4a084563c96860f9b2162b511cca164c43e5c5b04a120456ad097810f12bdd4c249fb43e7e4af1833e0755e5293a572ff6d36f1e469ee3627522cbdc03533a1b8d5d0b9c04ddb1516ff3cef5ea3005d5ac810e566eb3f26dfbcd98554fb947b7674779bba104dd76738b75b8f7721676b8", 0xc7, 0x10001, 0x0, 0x1, r5}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0xf, 0x401, r0, &(0x7f0000001a00)="c7d84b2b85f02a092b26481c36a540be9c0c3c639d4e5ae1ebfafabb805c4c92108b33bbc75b3aaab5302a580409b2f09afe6a17041fd02aa5657cabbe11f8c0ee56227fd7ba739805a07f180e921bfc4ee2ae452ff7f77902c3d086d9192b361641e8e555cd119d6b48e35a327c8dfd70eb9cc130b11cbc337eddb53d7f431bc3b86c058cc905cc09f44f7110abbd2977d0e177621da411ecb96ca89f886c68184637cdf39cad8be4db6ef96619164631decef2af99da725b8bb02c528f572cbf436abd", 0xc4, 0x100000000000000, 0x0, 0x2, r6}]) r7 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$UFFDIO_WAKE(r7, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) ioctl$UI_SET_FFBIT(r7, 0x4004556b, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) r10 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r9, 0x8000}, &(0x7f0000000440)=0x8) faccessat(r8, &(0x7f00000001c0)='./file0\x00', 0x104, 0x800) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000600)={0x1f, 0x0, &(0x7f0000000580)}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000640)=@known='trusted.overlay.impure\x00') ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r8) getsockopt$IP_VS_SO_GET_TIMEOUT(r10, 0x0, 0x486, &(0x7f0000000340), &(0x7f0000000300)=0xc) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000100), &(0x7f0000000140)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 17:37:40 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x60}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 413.746445] binder: undelivered TRANSACTION_ERROR: 29189 [ 413.752158] Error parsing options; rc = [-22] [ 413.765251] Error parsing options; rc = [-22] [ 413.775506] binder: 27321:27322 transaction failed 29189/-22, size 0-0 line 2855 17:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x33fe0}}, 0x0) 17:37:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400201) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 413.894489] binder: undelivered TRANSACTION_ERROR: 29189 [ 413.912603] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 413.937416] binder: 27338:27339 transaction failed 29189/-22, size 0-0 line 2855 [ 413.989070] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 414.028966] binder: 27338:27339 ioctl 8912 400201 returned -22 [ 414.060235] Error parsing options; rc = [-22] [ 414.061725] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 414.079245] binder: 27338:27339 ioctl c0306201 200005c0 returned -14 17:37:40 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff8c}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 414.153647] binder: 27338:27341 transaction failed 29189/-22, size 0-0 line 2855 [ 414.196090] binder: 27338:27346 ioctl 8912 400201 returned -22 17:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xb68}}, 0x0) [ 414.266228] binder: undelivered TRANSACTION_ERROR: 29189 [ 414.304148] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000040)) [ 414.475436] Error parsing options; rc = [-22] [ 414.526969] binder: 27351:27352 transaction failed 29189/-22, size 0-0 line 2855 [ 414.553347] binder: 27351:27352 ioctl c0306201 200005c0 returned -14 17:37:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xfffffdef}}, 0x0) [ 414.594300] binder: 27351:27352 ioctl 2276 20000040 returned -22 17:37:41 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="080000ac82bf0100"], 0x0, 0x0, &(0x7f0000000300)}) r2 = socket$inet6(0xa, 0x800000000000008, 0x1) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x81, 0x69a, 0x2, 0x7fffffff}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e22, 0xffffffff80000001, @local, 0x2}}, 0xfc, 0x7, 0x9, 0x0, 0x10000}, &(0x7f0000000240)=0x98) close(r2) r4 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffa000/0x4000)=nil, 0x1, 0x3, 0xa0, &(0x7f0000ffa000/0x3000)=nil}) [ 414.770086] binder: 27359:27360 transaction failed 29189/-22, size 0-0 line 2855 [ 414.873405] binder: 27359:27360 ioctl c0286415 20000280 returned -22 [ 414.931489] binder: undelivered TRANSACTION_ERROR: 29189 17:37:41 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='e%ryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:41 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x54c}}, 0x0) [ 415.362782] binder: 27371:27372 transaction failed 29189/-22, size 0-0 line 2855 [ 415.395600] binder: 27371:27372 ioctl c0306201 200005c0 returned -14 [ 415.426187] binder: 27371:27373 transaction failed 29189/-22, size 0-0 line 2855 [ 415.445540] binder: undelivered TRANSACTION_ERROR: 29189 [ 415.452711] IPVS: ftp: loaded support on port[0] = 21 17:37:41 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$rds(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x4e23}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/118, 0x76}], 0x1, &(0x7f0000001640)=[@rdma_args={0x48, 0x114, 0x1, {{0x2, 0x9}, {&(0x7f0000000240)=""/209, 0xd1}, &(0x7f00000014c0)=[{&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, 0x0, 0x717}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001500)=""/108, 0x6c}, &(0x7f0000001580)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @fadd={0x58, 0x114, 0x6, {{0xd489, 0x2}, &(0x7f00000015c0)=0x8, &(0x7f0000001600)=0x9, 0x7ff, 0x4b3, 0x7fff, 0x4c, 0x20, 0x18000}}], 0xe8, 0x40000c0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:41 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffb, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="24000000220007031dfffd946f610500020000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x188bb203, 0x2, 0xff, 0x7, 0x2b688995, 0x90, 0x6d}, &(0x7f0000000100)=0x20) 17:37:41 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREAD(r2, &(0x7f0000000100)={0x97, 0x75, 0x1, {0x8c, "4b06e192c39067e89f45c59969f72f40cd552536f0f5c5490f2275a15942d096d785aaf7b0104244a29da41e562fa9479b19eaa81106498a406d0020cfd2446ed81727f7935d2d9774d19909a1c35740eba81b0361dd2937380e6ad567f3a0a0cae04ead7f008b1e10d392f97a4b669ec9bf8b3fc65211015a0dc13a43f3fea364dd7629382169ca89716fec"}}, 0x97) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000480)=0xe8) r6 = add_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r5, r6) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000340)={0x38, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="09631040", @ANYRES64=r4, @ANYBLOB="02000000000000000c630000e5481040", @ANYRES64=r7, @ANYBLOB="040000000000000005630440030000000d630000"], 0x4, 0x0, &(0x7f0000000280)="b9981033"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x270}}, 0x0) 17:37:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x5}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 415.639641] binder: 27391:27392 transaction failed 29189/-22, size 0-0 line 2855 [ 415.678266] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 17:37:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x500}}, 0x0) [ 415.700200] binder: 27391:27392 ioctl c0306201 200005c0 returned -14 17:37:42 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$rds(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x4e23}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/118, 0x76}], 0x1, &(0x7f0000001640)=[@rdma_args={0x48, 0x114, 0x1, {{0x2, 0x9}, {&(0x7f0000000240)=""/209, 0xd1}, &(0x7f00000014c0)=[{&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, 0x0, 0x717}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001500)=""/108, 0x6c}, &(0x7f0000001580)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @fadd={0x58, 0x114, 0x6, {{0xd489, 0x2}, &(0x7f00000015c0)=0x8, &(0x7f0000001600)=0x9, 0x7ff, 0x4b3, 0x7fff, 0x4c, 0x20, 0x18000}}], 0xe8, 0x40000c0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 415.773775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 17:37:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:42 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x29, 0x20a41) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="240000000c0607031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x200, 0x3, 0x2, 0x0}, &(0x7f0000000200)=0x10) tee(r2, r1, 0x2, 0x5) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0x1000}, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) [ 415.884269] binder: 27410:27411 transaction failed 29189/-22, size 0-0 line 2855 [ 415.889037] IPVS: ftp: loaded support on port[0] = 21 [ 415.901830] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 415.914675] device bridge_slave_1 left promiscuous mode [ 415.920907] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.954655] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 415.978985] device bridge_slave_0 left promiscuous mode [ 415.988055] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.042079] team0 (unregistering): Port device team_slave_1 removed [ 416.050941] team0 (unregistering): Port device team_slave_0 removed [ 416.060195] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 416.098513] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 416.190812] bond0 (unregistering): Released all slaves [ 416.284929] binder: undelivered TRANSACTION_ERROR: 29189 [ 416.923831] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.945480] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.952738] device bridge_slave_0 entered promiscuous mode [ 417.032737] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.059123] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.066238] device bridge_slave_1 entered promiscuous mode [ 417.105894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 417.144921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 417.249952] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.256474] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.263607] device bridge_slave_0 entered promiscuous mode [ 417.275083] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 417.315139] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.326280] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.334254] device bridge_slave_1 entered promiscuous mode [ 417.344583] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 417.372108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 417.385031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 417.392425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 417.411844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 417.430882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 417.437998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 417.543000] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 417.555136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 417.562537] team0: Port device team_slave_0 added [ 417.588707] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 417.600159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 417.607776] team0: Port device team_slave_1 added [ 417.643813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.689192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.734219] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 417.741573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.749562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.783960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 417.791159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.804471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.814772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 417.822874] team0: Port device team_slave_0 added [ 417.861549] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 417.869386] team0: Port device team_slave_1 added [ 417.905767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.920512] device bridge_slave_1 left promiscuous mode [ 417.926219] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.965879] device bridge_slave_0 left promiscuous mode [ 417.971299] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.030480] team0 (unregistering): Port device team_slave_1 removed [ 418.040153] team0 (unregistering): Port device team_slave_0 removed [ 418.049708] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 418.097927] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 418.148581] bond0 (unregistering): Released all slaves [ 418.224412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 418.256192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 418.263288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.273114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.305947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 418.313050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.326615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.721981] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.728406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.735070] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.741494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.749715] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 419.009685] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.016111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.022809] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.029212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.037403] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 419.315257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 419.323198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.334485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.469772] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 420.571255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.613240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 420.619475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 420.633521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 420.710690] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 420.759402] 8021q: adding VLAN 0 to HW filter on device team0 [ 420.842258] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 420.848761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 420.862900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 420.987137] 8021q: adding VLAN 0 to HW filter on device team0 17:37:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ec%yptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$rds(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x4e23}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/118, 0x76}], 0x1, &(0x7f0000001640)=[@rdma_args={0x48, 0x114, 0x1, {{0x2, 0x9}, {&(0x7f0000000240)=""/209, 0xd1}, &(0x7f00000014c0)=[{&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, 0x0, 0x717}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001500)=""/108, 0x6c}, &(0x7f0000001580)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @fadd={0x58, 0x114, 0x6, {{0xd489, 0x2}, &(0x7f00000015c0)=0x8, &(0x7f0000001600)=0x9, 0x7ff, 0x4b3, 0x7fff, 0x4c, 0x20, 0x18000}}], 0xe8, 0x40000c0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xcbc}}, 0x0) 17:37:48 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = gettid() ioprio_set$pid(0x2, r1, 0x0) 17:37:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x14400, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x2d, 0x11, 0x17, 0x1b, 0x8, 0x7, 0x2, 0x69, 0xffffffffffffffff}) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1163484000000000000000000000000000000000000000000000000000000000000000e3ffffff00000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f0000000040)=0x2) dup2(r3, r4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendmsg$rds(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x4e23}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/118, 0x76}], 0x1, &(0x7f0000001640)=[@rdma_args={0x48, 0x114, 0x1, {{0x2, 0x9}, {&(0x7f0000000240)=""/209, 0xd1}, &(0x7f00000014c0)=[{&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, 0x0, 0x717}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001500)=""/108, 0x6c}, &(0x7f0000001580)}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @fadd={0x58, 0x114, 0x6, {{0xd489, 0x2}, &(0x7f00000015c0)=0x8, &(0x7f0000001600)=0x9, 0x7ff, 0x4b3, 0x7fff, 0x4c, 0x20, 0x18000}}], 0xe8, 0x40000c0}, 0x0) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:48 executing program 0: [ 421.721640] binder: 27924:27925 transaction failed 29189/-22, size 16777215-0 line 2855 [ 421.777146] binder: 27924:27925 ioctl c0306201 200005c0 returned -14 [ 421.951222] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 421.961413] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 421.974125] Error parsing options; rc = [-22] [ 421.980798] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:48 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x8cffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ec\nyptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 0: 17:37:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x458}}, 0x0) 17:37:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000667842bd5e530000000a02e52de7d9188efc3d1d0000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x8, [0xfffffffffffffffe, 0x800000000000, 0x5, 0x200, 0x20, 0x1, 0xfffffffffffffffe, 0x401]}, 0x14) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000140)=0x8001, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x2, 0xd6}, {0x4, 0x401}]}, 0x14, 0x1) 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 421.991036] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.003516] Error parsing options; rc = [-22] 17:37:48 executing program 0: [ 422.049480] binder: 27963:27966 transaction failed 29189/-22, size 1916412-9007199254740992 line 2855 [ 422.071082] binder: 27963:27966 ioctl c0306201 200005c0 returned -14 17:37:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecr%ptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 422.107886] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:48 executing program 0: 17:37:48 executing program 5: syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x81, 0x400) r0 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x601fb) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x4, 0x5, 0x4, 0x0, 0x30, r0, 0x12}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5c00000000000000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x40000000) dup(r1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x13b, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x800000000114, 0x800000000002718, &(0x7f0000000040), &(0x7f0000000180)=0x22e) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x577) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000300)=0x2) r3 = socket$inet6(0xa, 0x9, 0xffbffffffffffffe) socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$sndpcmp(&(0x7f0000001080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x40, &(0x7f0000000f9b), 0x0) socket$nl_route(0x10, 0x3, 0x0) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000000000), &(0x7f0000004000), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000200), 0x800, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x0, {"d0fda24b6d61078df1a7a8bd55d8ddc6"}, 0x18, 0xd2d6e28, 0x5}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}}}, 0x118) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280), 0x4) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000000)) [ 422.161967] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecr\nptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 422.219801] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:48 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xa000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 0: 17:37:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x210}}, 0x0) 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 422.265603] Error parsing options; rc = [-22] [ 422.278143] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.288641] IPVS: ftp: loaded support on port[0] = 21 [ 422.369382] Error parsing options; rc = [-22] 17:37:48 executing program 0: 17:37:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecry%tfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:48 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xdb0}}, 0x0) [ 422.444653] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:48 executing program 0: 17:37:48 executing program 0: [ 422.503598] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.524448] Error parsing options; rc = [-22] [ 422.533203] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 422.574510] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 422.588203] Error parsing options; rc = [-22] [ 422.681364] IPVS: ftp: loaded support on port[0] = 21 17:37:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aac6b7bc52b243ccdbd5f4b72941a5110e442c1d40b6fe7aa10e4120be8e8d538c2894c9ff4262225b58811a51fdeff25f318f32117f531fbefe9a39f136e307b300251f2a4c8172506505ad102292d614bd7aff61735d177f39a3d654b118f6f2a2c4d29da4027b095d29aad83619482c26a04b77c6734220f4da5943c6", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xb0401, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000080)={0x20, 0x0, 0x5, {0x0, 0x5}}, 0x20) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x500}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x720}}, 0x0) 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryqtfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 0: 17:37:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) close(r0) 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecry\ntfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 422.805587] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 422.826274] binder: 28058:28069 transaction failed 29189/-22, size 0-0 line 2855 [ 422.838988] binder: 28058:28069 ioctl c0306201 200005c0 returned -14 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 422.855179] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)=0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) set_tid_address(&(0x7f0000000180)) fchown(r2, r4, r5) 17:37:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xf6ffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryp%fs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 422.897219] Error parsing options; rc = [-22] 17:37:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x5c, 0x45d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x1f000, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 422.956195] binder: 28086:28090 transaction failed 29189/-22, size 0-0 line 2855 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x6d4}}, 0x0) 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryp\nfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 423.050277] binder: 28086:28090 ioctl c0306201 200005c0 returned -14 [ 423.069389] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt.s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 423.106959] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.120931] Error parsing options; rc = [-22] [ 423.126733] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffffff00000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 423.160314] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt/s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x40000000802) r1 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2000000000100801) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L-', 0x5}, 0x28, 0x2) dup(r1) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2efb43aef1acc48a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:49 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x200, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180)=0x40, 0x4) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000200)=""/48) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000340)=0x4, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x3, 0xf724}], 0x1) arch_prctl(0x0, &(0x7f0000000380)="e22635a55ff507f161a2248bb87560183424088802db069c709b78fba86cfa2e53d4063db4195d3ffaffa2b9b5cb72967c61455b88c61414e4eb8ce4802fca25360778ae8b1832ad9e0b10bc69ac2f225795e5311ca2e9812f3e4d2a7f36a8511ddebed5cf68ed66219b41883b9e32a458e72e49b2f13f853e79fbff421d95c6406d2f0ae38f260b7cb304ab6d65a630e1f8a2507291c5c39de644ce3c2d8ba02ed501e8bed4e711c8a7e4192caa4836468f18088d0e6afbc42f3fad33778dcd366e854ba1258d86c819c1f00685c0ca86cdbd46ae9534a47229c3044342f46923") sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) [ 423.240550] Error parsing options; rc = [-22] [ 423.256974] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptqs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 423.300478] binder: 28139:28141 transaction failed 29189/-22, size 0-0 line 2855 [ 423.310256] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x8}}, 0x0) [ 423.349078] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.354455] binder: 28139:28141 ioctl c0306201 200005c0 returned -14 [ 423.372093] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.419674] Error parsing options; rc = [-22] 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt\ns\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 423.442273] Error parsing options; rc = [-22] 17:37:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xff, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000080)={0x1, 0x6, 0x100000000, 0x5, 0x8000, 0x1, 0xfffffffffffffffa}) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) socket$inet6(0xa, 0x3, 0x800000000000008) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt%s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x994}}, 0x0) 17:37:49 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) socket$inet6(0xa, 0x3, 0x800000000000008) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 423.575879] binder: 28187:28190 transaction failed 29189/-22, size 0-0 line 2855 [ 423.585113] binder: 28187:28190 ioctl c0306201 200005c0 returned -14 [ 423.660819] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1163484000000000000000000000000000000000000000009d000005000000000000000000000000000000090000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000280)={0x2, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x53, 0xffffffffffffffff, 0x91, 0x1, @buffer={0x0, 0x5f, &(0x7f0000000040)=""/95}, &(0x7f0000000100)="7239f5089a131258416ad2ad4cfabc47b39609dc5f7268448bf2f3cdfb84be2fcc61fe87f23d4a3eddea551c321cb0ef352ea612390f3152722378cc401d38e57dd6dc91f585ff690ede90ffe1e652b221e0a742f86a1f1706c64c93c5983054aee9b1453aaa8f5d6c30d34a6423c3adbbc2c5947bd0c03e9484d0cd2311bef924d62d0eb4354880b8a15bba4b94d062d4", &(0x7f0000000340)=""/236, 0x0, 0x10000, 0x1, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) splice(r3, &(0x7f00000004c0), r0, &(0x7f0000000500), 0x7dc3, 0x4) [ 423.705843] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 423.745665] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.767869] binder: 28212:28213 transaction failed 29189/-22, size 648518346341351424-0 line 2855 [ 423.784004] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 423.803853] binder: 28212:28213 ioctl 4008af13 20000280 returned -22 [ 423.825541] Error parsing options; rc = [-22] [ 423.830173] Error parsing options; rc = [-22] [ 423.831449] binder: 28212:28213 ioctl 2285 20000440 returned -22 [ 423.857299] binder: 28212:28213 ioctl c0306201 200005c0 returned -14 17:37:50 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:50 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf%\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:50 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x60000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xa88}}, 0x0) 17:37:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x7) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) shmget(0x0, 0x2000, 0x400101, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0x400008bca) 17:37:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d71e2bf8935850eb6f287a7f99", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x10080, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, 0x4) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000180)={'veth1_to_bond\x00', 0xca}) close(r0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x104, 0x1) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:50 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf#\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.268551] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 424.284727] binder: 28224:28233 transaction failed 29189/-22, size 0-0 line 2855 [ 424.294032] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 424.305046] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:50 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 424.317450] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 424.376741] binder: 28224:28233 ioctl c0306201 200005c0 returned -14 17:37:50 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x4000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.430227] Error parsing options; rc = [-22] [ 424.434976] Error parsing options; rc = [-22] 17:37:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x9cc}}, 0x0) 17:37:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) fcntl$setstatus(r0, 0x4, 0x40000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:50 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="663ef20f2d65e53e0f073bf60f238abaf80c66b838279c8f66efbafc0c66edbaa000b866f2efb82c018ec0650f01cb0f09ba6100b032ee", 0x37}], 0x1, 0x0, &(0x7f0000000100), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000080)="9a003000008100c4e17c53aa155b0000b8b1dc00000f23c80f21f835080090000f23f8c4c255920436b8010000000f01d9b9550300000f32c4c1dc5471380f01ca660f28aa2100000066b89d000f00d8", 0x50}], 0x1, 0x22, &(0x7f0000000180), 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x10000, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)={r3}) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000003200)={0x3, 0x0, 0x2080, {0x0, 0x6000}, [], "d07ee5115b8ae83623a4057635ff839665dc71032fe5bd7f4cfeb5de0e66f292625b3c83ba87c800e738a125263d6bd6160d8a90b160a25b8e6f4205d104ecca27734a655ab6b937108e5e87aca4e1b5529c6394c440f60f4ccf972c0c286fde28b7feceec47d977a08a7f8a193c772ccf4e1aebd71a2423bbf620f291eb5aca0c746e9eb0958cd608d4e6da2d96ea1427c4176c30981b69008a5f3283355bf825ea8e31af3b9f3b13875273d3eca307189e3b02a660effcbebfa31c5cadabe1a3a8e301cde0fea0c98c92bbdf6504141cb8fba7af0b3191285b6d2e33a90b41dc081fb289688faf8d40e12ba51d93ffaddd57ef0a578c3052390ab5e43df11af893f5c573a7e1a792b38edea041a28a7b72690e07d68877d73cda83e439e23135e4b2f80a26d86155bc17052886f12ba5dfa6593f766141e391b09544b986514347ed148ba344799ce56dd92ea99c9222bffe399dc436eaf3d2fb2eec4495f169e2d412a5e645af48245c39d059460cca16a6cb085adae5b33b576ba001a2ae21335708820d6e59c36296bb3b1ae41e00ced746e1bb10ab20dce8401ad2c8da2157c7437e24031e28a67c4c51b393673f54ee12c499edc99ea48f4821e83aba99eb8a1070ef27e24e974fd5eae386c144fa65902415923d9b58506dec2ae86c95ed9229438ac62c8165d54f74b6960dfc02ae09607a83e43bfdfde70a50a7a4c68cf9c16b8707ac2d559faec9b77e85c6db3da4cc32525e7ce7bd5514f29883baf374eca8302dba967bca0fec783a01266e03c947026ace1ea653aa3bb39c99bb3ec87d984c0db3e9a80eb3248e43dba6b64c228e2ef93c384a06d6259804277a59e2a23f13f9366e8a38d7a0f0737aafe82fd3c784f5aca1da86b8765313ced4cafdde6d2e811750895264f530b202517dc2c64b87de72458e8a0a05a1759bd837de65a46968b48cd52f85a4af9709d031a396dbaa302b8d07cf334a209fda41b6f478924eb32941cb74de620dc054dfbda780316280133c18a3c34388931c4e1b023977ff432928af801584585b8187feed1c89750efc887a8abfdda565d1ac3815365cd44e708743169c220df70794c34ab96588e4b4580ef84792ca845e8466a4ca368712b86390047550bba1a4b54c1ccf5ad664d6c6d757d32f9e02a391d5fc43aa73a787621d5330012abef425eb9002874d314aa504a1a1a9ea01ebbc4e49ffb06cce3adec2c6783f33a0dbaff1301f7dc2f733189fbf1d8a98fa9a53103deceacdac7b9ecc80665fcf938ae1658af2abce7065a9001f961e7c81f54a3f924d698f017b57b367b9b3a233985ad7707b2adb535c8788031cc939a100eba443487d205a784fea409f8c912c6af0e781fdd36c336665993614df05bce28836c6298d9fbc4476d2d4dede27a794ea2561e4f587aa630510f09ae84d327dd84e416c408d9336a304c7dc73710da4259a4adacf499eed14178c38845cc891f31ed4bba88c6a324ba7e4e32b198cc959e9f6c9dfc9c5ad10b3fef0a03828379147765f5a2103e63b9b27cc89c5abfea53fdf5dbe2e57e3845f055e81a9cf85801fadfc898efa5ea044b36a592770c7c6f9f3153103cb4a229c18da6bd8b75bce23ded850aa7d8dafe2afab95c59a200856da85ee549cca22f176bb1afb694ec8aae2223fb982590eb7b44324625728ac9661207c63cc3ac65e898c51b8c9aef23c7aaf8f2411c1e6bf5fa30c3db451e91b780bcc73cdfb53d6a2b6f3a0600135eec6ee2b558484f0b7fe2c4592080e604afc11b16c1102d200dcd98054c280ccc98b054d5d3c37383595944a7f5603ae7be51d1671b8213d723812fc134c4e5a1a13dd288272e0b889f5ee4544b1a74f9a9e061e299fa64bef6a276cbf35dae45c236dc823f2ed5d90c98248fbbaaf357f63ffd5681e8c60c65b0471ee975736bb753b320d9edf279afb276b78b06349cbd812846e43526d998b4535de85f42e6ac32a9d44bb2edb261168960c7c6ca7ebf239aeb480436507b5de4997682bf6059a84f896dcfee8752278e5d9f08e3a59ac6a707103275eaf595d2e264d1477f595128d4a9daafd8cd7c9c0f19378a0225cf77286572960a5dcea3c07d70861270862d979ee6bc8d43c0186862b4166bfe172bd9cba2d85104e1ca9c788524df29866a0b3e768b63ab98f7cb3ec1d573c44b5e1a0b9c4bf3c525fcdec8042a8f2c4623e71ea080c7e12c5a3297d3c35dc17e74a5ce9d779ef9dd5f3022739dd15c42ca5db6e16781fce484f13531f00454018f57386f8fd4d2bb2d07b7992fe77eca48d689fc29028a2ce757e92bdf281954484d0fbb3f6b3d28084330aa4811e87819feea18ef9517cb75fc1a7dede2534a3f362f2cbe2d917b2a1be430eb31d4a4d5bb29bbcde8cd33fa4f4950d6ad66259b34f7a615dedd3a321b45e70ade75635f86acfa46b111ab2859eed140e6a0bc7155895c046156742a1774c619b7ffbada1ef14070c0f5171afd728e05f3cacf6b77543105d3e8f57fdefd4f3eb49e1212b3ff6c9e53954727f01ef35e9ae1314c96cedaec73fc70b484562de5ad1ecd3d9f262a0841fe05f9d823d6a5e20fd90d50b6c3edfae340565042bb22bfccb433dcee0da8e771ce268fc108784d9267599b6de411655f94e9c12931fe88c4b8e7632aabf2d93e17632277f270ee3940316468adc35c93a9fe2c1cdedd7055ebec7f7b0b43deba218c536da593e2024a5aa3f94ec7d6379e876949c8b3a0193fdc6e5504f5cab5c60ad5b6e798e171d1fb67a3efb823a91452d3b4ccbc9e0119467522ea2fc59153f1cd218a83c86fadaa43bbc3d3df7574f910a921c7fd195a90cd08671e7587dfd4f1ee4f44c8eb8aa6122337a0fc2ee9a0918021ee6fac1a58d93732b867fb67530ee7e0f4d97b352922f6754783f978299cd15672a7fc0a05f6717ea3a9e0988fcdbbe0201b6c85e5a311cc34560091d66758a9f916683d70ac47734121cb0bb8b914592720d6e88dff8fc65ebdc93c5aaf04e5e791c40c728811f947bd0e47602892feb5c2d412c2f2ff66afb7ff3af62b26a271ad246d374004e965a478edec95ffe03c9eeeda81ab1ce29a3dac1961bec70b86e024dc98119550d0c4bacc9fcc9b49cd07b1988704ddd4d9c875d2ddb27ee6cf17abbaa88553cce24240807c4c0f93e4d5e25966562062556cfd99973277699c7c3079ac945cab58fb9aeb61038e97041b375880cfe9c684aff0a1fbc922d971297db145cfdde1206e301928f9e256df4495374f408f5d1195923d82a8f5e2cf7a3cdacbc62d3d36692f11c2086e123d23647d6f9f5285effa2e0ab00493d5981fd636a4e6f3929d297d2b9f48e55e9db3e5c3a4c4ed5d473a273aeab608531db532e9ac8d5c1e29f404f13c69925380c8c310934152fe6d442db2dbb646889bc48011b1f91d07a89dcde90329f1cc84718631cdfe03e2e458f4cf4e2f4122aff94322a77fb8b5da1c0bd29922c73f4919578e6805f5a6c62069949db8fe99c281b0990ba1b0c0be17efe8f545a4ffc50857dd1f0133171985ec4eac992add043ab1cec8d16174311f8e89ed04e80b5baeb69b2da5e32471908a2254bacc42372d4b03c6e5c4df914a75fb87a2a0cbbae2fb7918e9af9614c98282fcedb6aef4d06debbc623aaf22a2e993fab42389ab2f27e72e8789f11cbbde18327b3a360f567df53a67f660fb77d9f2fcae43e8ae73aa7c58c81e948ebc132dbd1f7ad3be39ce3eacebf795b542a18a49c296fd2c98fa6c1c92f29392136c2e8e0dc0150b7cd2d91714b006985ddcbd80879676a3f85a75c4d3b5415db93f94505bc3eae2ecbef6de15615514af54bd885288684376e1d11227360773a35856719e18aec11d15ca0679ff4d53c477c9cd30a7a45ca6a4838c0b085078bd42e6042be8269ce9759f1d23fa98cb8263c8d4ac89577bf3154369e5b40bb1ed28f048a4006efb707b5eacb2f6b3e93c6d19eeeff49949e8b5d21894caaea8172d43bdf6997fd356ada3fe6ca691d86549fedefc719b74d739c431ecd4800c104c80c6621dcff5eb98c47b7b32e2fca7974f2bb1024e4146bf0ec5143e8b10fc29c5bc2f77b5021c34e04c26b93f02bed53c17af765a2853710d7f2c49192b577024233fb566776973c62239d038fcc1353e36fc200d386fea3268699aaff0c6589cb2245d3e967a3eff5cc866527adad4ceed45ba619ec8b053bbbb62b88f3bea4f6380a5a62d86608e5e6e355ffb78a484c013f19977943db91b69686c818187438003b93378ecc8667c9902b0ee36a6560005e87ca8132b338d2116dee1c051a1f815df2950cf15bcb3129b9e17bdcfb2130fe3597852fed354a259cce452d10ad2ed89b71b0a71c173c95578c687f0129952e65e783b33bcb53183c017b4a3f687f9d985d6369602a59351059f9a9a3985ae7d796eac76c66a6eafa48386d9fbf9f7f3496b8c5a75f489e3dfd596e7a1786ceb22a80d855dc9ebbcce089541d229de4e6b3a963f2d7fa9cb6bcc14eb6ad856b950859f40925dbc3aece4dad967b971223f63a66514aa6eda9617cab9553af61cfbb230f687c77b5cf51e8df891de582978ab5cf76d4fb35127fb20b624020a8dc23f27e27d215101c773679722929028fd164a7d44cddb6000ba6e3f17cb268a5d3bc3528d3a31ea506a2ddaf6a1d3e0cb695719f958fe762b8e467dd9f4808e22a0329037d3e92a1f31600441503bbea4769e1d055d53efbd915c2c9e3b7a91e66dcf9e0dcc8c19de36096df44e81898347fdca40e0afca5f428b8d78a301415588eb7a0fe859af02f2c88ad2ed960d68e9ea0b1379611298e0f0a0c8dbee814d32215e631abf288be6f2ea95a801dcce8945a183ca708d8523528410deab79c332646a610a4439d77c0895a1dcf626bf3c2e53cc1d809f27948c2a0528cbbf737612b52a28e8f9eb8241907574a2ab1f17f72132be70ba6fa3e3ca004144a241cc2c6a668988cc8c8f7b54e963b760f53bb2ee14b7018a0e98a8a5df2eb29d516d008ce5be587b60c712fae13c286510d77ac2bf45a084552b4eecb84c5c358f9419aac5b4cba705576885e15aaa26bbb910c0fea609492587d5f4d45551c52648a457387eb5b0614f189faca1f4be1ac326260a96cf3d0814dc5f6dfa36fe219663315771f78ebc1f942d859e723aa214aea82d2283f7b6b0b27aade2c0ef85bbe8bd5fb5d32df6ebb1fb73b665a5ac57a3e2d23c6037ef03d71573f89e6054f9bd0256c55e30a549c7490c0ab8215ff9d86700045b59c97216421b504a6f956bb2e4ce2abd3522ae7e78140d1c051affd088a9b41cb8df7269e318d26fd5532cad44eb2e7b3eb2f4e5c5f3ee8fafdce7fb49da1054e498917ae63d401d17f6948c454bc0e1fe6ee962106f4f50e1f107d215275488ee933b806825e759241741ce028a2aa29592e323e0bb0065c4e0ec8b76fa8905e3a2261d9c97ebe87c65d39b9df25fa7d0cc9d2f0887648e5eeb70c5f91503dec67adf8e206ad32c51f9ee25b3503c712fa725ffd30131eb026778b06c8a45e8131d029d7e22062ca4dad4b4d67c164c932926c4f3dad991756623d8fe1ab39590bf53085036fe484c137be5a1af5e464e6df871db54057211a842c40de3069fad8320d74ffc1d5c0dba4b63d84f69a36e5c820cf92fa15db3597f66c66e3f4d4616134f3754029e69374c5e439358eca89fc25cff9b1abf2e5e98ce310f6bbbf052058906949f5852e241425c542e5a3c5091272cb00", "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"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 17:37:50 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf.\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.568119] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 424.596603] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x6e8}}, 0x0) [ 424.628970] binder: 28264:28265 transaction failed 29189/-22, size 0-0 line 2855 [ 424.653403] Error parsing options; rc = [-22] 17:37:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfx\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.679584] binder: 28264:28265 ioctl c0306201 200005c0 returned -14 [ 424.688214] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:51 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x80000000, 0x7, 0x800}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 424.758936] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf+\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.830049] Error parsing options; rc = [-22] 17:37:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf-\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 424.878387] binder: 28301:28303 transaction failed 29189/-22, size 0-0 line 2855 [ 424.917088] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 424.940416] binder: 28301:28303 ioctl c0306201 200005c0 returned -14 17:37:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000640)={0x70ef697d, 0x800, 0xfa, &(0x7f0000000840)="7ad5db3696bfc6534892ca40bb57c84b87526d16b9970b94cff63dda29a3e897447d47caa41908558c7fedf57cd8e197838c79724fa3e550bdd894d1fb9b9eda913671c065f144d651611e690e848c57d169bbd3958bc660ed0e0ab59e4514ea5ff5e7e39f5c6a62d2e674e25e3217de8b3e45d4a36212bad8e2ba84571d3b3b3230a76e0d14aec12b71c6b9c6ad5760f66c923b5f15ec5d200ed14c5acd67c7b2de78daeee74aae911003a557b38c51a81949dfc5f41c1a1e36b0859b6a53c97a266b4db0f00fde26f5064132829068c39ca453d29c9028e75e95ba21edba70a5eabe3cb4d7529db448ba150d284c11de8c2a0a4e270a3010da"}) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1ff, 0x40) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000001c00)={@dev}, &(0x7f0000001c40)=0x14) accept(r2, &(0x7f0000007ec0)=@can, &(0x7f0000007f40)=0x80) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000d40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000680)=[{&(0x7f00000009c0)=""/75, 0x4b}, {&(0x7f0000000ac0)=""/252, 0xfc}, {&(0x7f0000000bc0)=""/226, 0xe2}, {&(0x7f0000000cc0)=""/118, 0x76}], 0x4, &(0x7f0000001c80)=""/4096, 0x1000, 0x6}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000a80)) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80389}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9}}], 0x48}, 0x0) readahead(r3, 0x100000000, 0x7) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000800)) 17:37:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0000000000047bf26a4d95d08bc70000"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x180000000) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 425.017998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 425.038754] rdma_op 0000000085debccf conn xmit_rdma (null) 17:37:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:51 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x6000000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 425.064625] rdma_op 00000000b2aaccb9 conn xmit_rdma (null) [ 425.079064] Error parsing options; rc = [-22] [ 425.107046] binder: 28328:28329 ioctl c0306201 200005c0 returned -14 [ 425.162581] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 425.189992] binder: undelivered TRANSACTION_ERROR: 29189 17:37:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x200000d4}}, 0x0) 17:37:51 executing program 0: r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f0000227f74)=""/140, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x58, r1, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x61ec}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4) [ 425.218312] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)) fcntl$setownex(r0, 0xf, &(0x7f0000000340)={0x3}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="00a78f54a78d0751518cd400000000000000"], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000280)={0x0}) r4 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x4010, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000001780)={0x10, 0x30, 0xfa00, {&(0x7f0000000380), 0x1, {0xa, 0x4e20, 0xe7, @ipv4={[], [], @multicast1}, 0x80}, r5}}, 0x38) r6 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000000, 0x80010, r2, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000180)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x140, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="01634040020000000000000001000000000000000000000011000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="000000000300000000000000852a747001000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000002000000000000008f9f000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000300000000000000"], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000007800000900000000a000000000000000"], @ANYBLOB="01634040040000000000000002000000000000000000000001000000000000000000000000000000000000002000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="10630840030000000000000009631040", @ANYRES64=r3, @ANYBLOB="0000000000000000046304400100000001634040010000000000000001000000000000000000000010000000000000000000000048000000000000000800000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="0000000002000000000000000000b8000001000000", @ANYRES64=r4, @ANYBLOB="0200000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1263484002cd0015000000f60900000000000000000000582b0976d5dd2337000000000018100000000000003800000008000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="852a627700010000", @ANYRES64=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00X\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0401000000000000"], 0x1000, 0x0, &(0x7f0000000740)="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"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 425.307347] Error parsing options; rc = [-22] 17:37:51 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:51 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x700000000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 425.330780] binder: 28348:28350 ioctl 8040552c 20000180 returned -22 [ 425.402590] binder: 28348:28354 got reply transaction with no transaction stack [ 425.423294] binder: 28348:28350 ioctl c0306201 200005c0 returned -14 [ 425.464148] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 425.525316] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 425.569341] Error parsing options; rc = [-22] 17:37:52 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf0\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0xe}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) 17:37:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x3f8}}, 0x0) 17:37:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:52 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_rr_get_interval(r0, &(0x7f0000000040)) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r1) dup(r2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:52 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xedc0}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 425.926457] binder: 28372:28373 ioctl c0306201 200005c0 returned -14 [ 425.935758] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 425.960518] binder: undelivered TRANSACTION_ERROR: 29189 17:37:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) r2 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r2, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) r1 = memfd_create(&(0x7f0000000000)='tls\x00', 0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f0000000100)}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0xfffffffffffffffe, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000001c0), 0x4) [ 425.980130] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:52 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 426.062644] Error parsing options; rc = [-22] 17:37:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 426.089244] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:52 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@vsock, &(0x7f00000002c0)=0x29f, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'teql0\x00'}) r1 = socket$l2tp(0x18, 0x1, 0x1) timerfd_create(0x2, 0x80000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x181002, 0x0) getdents64(r2, &(0x7f00000003c0)=""/250, 0xffffffffffffff7a) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000000)={0x5fff, 0xffff5}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'gre0\x00', 0x200}) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fstat(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) syz_emit_ethernet(0x67, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb81001800080500011b556e55e38ec5715ef74ac53bae66d90effc753fd89973c22d1eabd1826cf1a3606dc9a4c7f79fa6b067ee3bd17e3869524512283fe7002ac34b18dee81a0b248d46a7fcba2d19577a7a38bbf113cf3bfddac"], &(0x7f0000000040)={0x0, 0x0, [0x0, 0x0, 0xd8a]}) [ 426.163014] IPVS: ftp: loaded support on port[0] = 21 [ 426.178273] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:52 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', '/dev/binder#\x00'}, &(0x7f0000000100)=""/111, 0x6f) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x5e0}}, 0x0) [ 426.215408] binder: undelivered TRANSACTION_ERROR: 29189 [ 426.215604] Error parsing options; rc = [-22] [ 426.343306] binder: 28401:28404 ioctl c0306201 200005c0 returned -14 [ 426.948397] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.954779] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.962083] device bridge_slave_0 entered promiscuous mode [ 427.001412] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.007837] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.015025] device bridge_slave_1 entered promiscuous mode [ 427.039591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 427.063591] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 427.130597] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 427.160771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 427.269925] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 427.277065] team0: Port device team_slave_0 added [ 427.299418] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 427.306864] team0: Port device team_slave_1 added [ 427.331823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 427.359585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 427.384046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 427.411989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 427.525805] device bridge_slave_1 left promiscuous mode [ 427.531243] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.575927] device bridge_slave_0 left promiscuous mode [ 427.581382] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.640740] team0 (unregistering): Port device team_slave_1 removed [ 427.649440] team0 (unregistering): Port device team_slave_0 removed [ 427.658749] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 427.679458] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 427.748571] bond0 (unregistering): Released all slaves [ 427.898732] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.905072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.911742] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.918117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.925073] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 428.905310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 429.016867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 429.092578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 429.166954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 429.173052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 429.180548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 429.256913] 8021q: adding VLAN 0 to HW filter on device team0 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfp\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x2000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80c0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10002, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f00000000c0)="f30f1bd90f01c9f3f3672ef0016d7766ba200066b8000066eff20f01c8c4e1b9d4c8d388d28e000026f20f7cd1b9800000c00f3235010000000f300fc76d00", 0x3f}], 0x1, 0x8, &(0x7f0000000140)=[@cr0={0x0, 0x8}, @cstype0={0x4, 0x8}], 0x2) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000200)}], 0x1, 0x0) 17:37:56 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11630600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x141800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x7dc}}, 0x0) 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfX\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 429.782952] binder: 28676:28677 unknown command 418577 [ 429.796644] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 429.816235] binder: 28676:28677 ioctl c0306201 200002c0 returned -22 17:37:56 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000002c0)=0x14) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = dup2(r0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000100)=0xb4) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000380)) listen(r1, 0x4) r3 = getpgrp(0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000000c0)={0x0, 0x1, 0x2, 0x2, r3}) socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000180)={0x5, 0x6}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000500)={{0x2, 0x4e20, @rand_addr=0x4}, {0x0, @remote}, 0x4, {0x2, 0x4e24, @rand_addr=0x8000}, 'eql\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff}, 0x30) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000280)=0x4, &(0x7f00000004c0)=0x4) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x36335bf1) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000200)=0x8) socket$bt_rfcomm(0x1f, 0x1, 0x3) write$binfmt_misc(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) r7 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)=0x1) dup3(r0, r7, 0x80000) [ 429.860556] binder: 28676:28677 ioctl c0306201 200005c0 returned -11 [ 429.870097] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xd50}}, 0x0) 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfi\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xedc000000000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 429.955346] Error parsing options; rc = [-22] 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfo\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:56 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) r2 = shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 430.105794] binder_transaction: 8 callbacks suppressed [ 430.105812] binder: 28732:28738 transaction failed 29189/-22, size 0--1125899906842624 line 2855 [ 430.127828] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfd\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 430.178244] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xb7c}}, 0x0) 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf*\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 5: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000080)=""/49) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x67) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={r2}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 430.309748] binder: undelivered TRANSACTION_ERROR: 29189 [ 430.328788] Error parsing options; rc = [-22] 17:37:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 430.400940] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 430.414879] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000002c0)=0x14) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = dup2(r0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000100)=0xb4) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000380)) listen(r1, 0x4) r3 = getpgrp(0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000000c0)={0x0, 0x1, 0x2, 0x2, r3}) socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000180)={0x5, 0x6}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000500)={{0x2, 0x4e20, @rand_addr=0x4}, {0x0, @remote}, 0x4, {0x2, 0x4e24, @rand_addr=0x8000}, 'eql\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff}, 0x30) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000280)=0x4, &(0x7f00000004c0)=0x4) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x36335bf1) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000200)=0x8) socket$bt_rfcomm(0x1f, 0x1, 0x3) write$binfmt_misc(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="42aa33948186be8f28cacd20208b5c7258d792af9973a70b1a1d7087ea2b58a10455f0da2588a30a1a5b18aa8e18e855432664641ec5af614feb159107b83ccdb92f583207b9ca08e077fb38ca4ca72c0270c39d7fad173976666dbfe00102c5fab13bc64c0066666a8b7f7f49f8bc7ffff825b23e0c363d466d101190b9f4edf637cd14e61ff2e14d9b7362a8559756c08a43ffcdf8ad02e087e6b9a73676f5647aace822375afb4175137f365cc732367b0c9883cfc6795d08086b6081e8c02acbe56c92c770381b4701c9d8b192616c0b368dab713ddd190aa838bd33b20e3dcc46d673e981dc4f7d1b2646c238eb99efef8ef0bb1129d4aabac7dadb533799ef212c8380e5a5b14667d45c4e45f5b827ed09397798e2e0a854cf4cd0c8675bb11601ecff8fd6327d3f8a9167ad6d057d33c112fc70c4253fb7bd8fec91a586222ebeed5f144111d456a3b09d09afd658476eb119581101616591b9b8939901b3377743c69a666c941653b322776e75c945735ee7e796b50900b356efe6d65784c52441ab7c234cff1a4af0029619f63a4419d543b7c0045d5be3893af308ec648b0a17c21c3b41e2515536787a3110dcc04ad9c6e7f6994d7c21157ba8d0aeaa6638a262c390997ff8d17a7990c5f3eeed1aeaf586e1a5417e633c10391ab3fb6e9deecbc0d0bb37fd0c34807966a38efe553c4358de06fedae4263221ecc204129026ff942311835ee30bed56ea062ed88b1b7990245d1decffcfecf86f6b1775b4bcfa8d53b75dd3f9bb19a2bedaa40b28"], 0x0) r7 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)=0x1) dup3(r0, r7, 0x80000) 17:37:56 executing program 4: write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r1, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) 17:37:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x814}}, 0x0) 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf\n\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 430.453709] Error parsing options; rc = [-22] [ 430.465692] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 430.483227] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfc\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:56 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0xffffff7f}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfl\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 430.635672] Error parsing options; rc = [-22] [ 430.645102] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 430.657611] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 430.668071] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 430.680891] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 430.738319] Error parsing options; rc = [-22] [ 430.758166] Error parsing options; rc = [-22] 17:37:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xad4}}, 0x0) 17:37:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x1}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='qcryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfu\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xe44}}, 0x0) 17:37:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='\ncryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[], 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 431.280659] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='%cryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="6563727970746673f6", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0xffffffffffffffff, 0x40000}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 431.334353] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 431.357051] binder: 28845:28862 transaction failed 29189/-22, size 0-0 line 2855 [ 431.365454] Error parsing options; rc = [-22] 17:37:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='e\nryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 431.413710] binder: 28845:28862 ioctl c0306201 200005c0 returned -14 17:37:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000340)="c48697dda684949b47426fcf17ecc235bc6d0d1b3f9458995eecfa4c4f72c2e8d6f0bb5458ec3940ec2e02c8755c089613311dd0b15ff4826570dfea1d788af443c13853954d1c753be604f55518e4a4a98ada2eb1e89c68b912ae2af51e4c9327b9286a671b488588726c2391e4e2c5e94d284825000000000000000000000000000000") ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000600)="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") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[], 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 431.480059] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 431.514343] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='e%ryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x4ec}}, 0x0) [ 431.529899] binder: 28889:28890 transaction failed 29189/-22, size 0-0 line 2855 [ 431.542956] binder: 28889:28890 ioctl 80487436 20000340 returned -22 [ 431.559507] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 431.576298] binder: 28889:28890 ioctl 4b6c 20000600 returned -22 [ 431.590402] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 431.595910] binder: 28889:28890 ioctl c0306201 200005c0 returned -14 17:37:57 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x8000000008, 0x2281) memfd_create(&(0x7f0000000600)="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", 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x4081806) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x20020102000007) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150006000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='eqryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[], 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 431.630270] Error parsing options; rc = [-22] [ 431.648322] Error parsing options; rc = [-22] [ 431.667065] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x3) 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ec\nyptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x538}}, 0x0) [ 431.755803] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 431.757420] netlink: 13 bytes leftover after parsing attributes in process `syz-executor0'. 17:37:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 431.805747] binder: 28930:28931 transaction failed 29189/-22, size 0-0 line 2855 [ 431.834689] binder: 28930:28931 ioctl c0306201 200005c0 returned -14 17:37:58 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 431.850105] binder: 28930:28931 ioctl 40045532 20000040 returned -22 [ 431.856779] Error parsing options; rc = [-22] 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ec%yptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000080)={0x7f, 0x9}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=""/138, 0x8a}, 0x0) 17:37:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) getsockname$unix(r2, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) getsockname$unix(r3, &(0x7f0000000140), &(0x7f0000000240)=0x6e) [ 431.933025] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecr\nptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 431.981573] binder: 28953:28956 transaction failed 29189/-22, size 0-0 line 2855 [ 431.984203] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:58 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x364}}, 0x0) [ 432.030325] Error parsing options; rc = [-22] [ 432.030442] binder: 28953:28956 ioctl c0306201 200005c0 returned -14 17:37:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecr%ptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="116348400000000000000000000000ae0b000000000000000000000000000000000000000000000000000000000000c2bad51d4e34acb3ac525aab08cc4cd9ec25135278578431cdd1992ac7a0202c071ae31cd3a3fbe4f8a0b228af3493841a44601a9ef9239a1fab0445da0dd24aa2d9320dbe245927721b92c97d5ceda792d7ba3fd58b3ca6d57f99655c8b4b19be346f68f180a7163c0467ccaba377e60d559b483f", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) r3 = getpgrp(0xffffffffffffffff) syz_open_procfs(r3, &(0x7f0000000040)='net/hci\x00') 17:37:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecry\ntfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 432.185895] binder: 28985:28992 transaction failed 29189/-22, size 0-5628890107378401280 line 2855 [ 432.188953] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 432.206130] binder: 28985:28992 ioctl c0306201 200005c0 returned -14 [ 432.214572] binder: 28985:28997 transaction failed 29189/-22, size 0-5628890107378401280 line 2855 17:37:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xff80000000000000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001640)={r4, 0x80002, 0x1000, "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"}, 0x7be) [ 432.248408] binder: undelivered TRANSACTION_ERROR: 29189 [ 432.259064] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 432.303044] Error parsing options; rc = [-22] [ 432.316871] binder: 29010:29011 transaction failed 29189/-22, size 0-0 line 2855 [ 432.340131] binder: 29010:29011 ioctl c0306201 200005c0 returned -14 17:37:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'s}z_tun\x00', 0x102}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x8, 0x1800) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecry%tfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="6563727970746673ff", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xbc8}}, 0x0) 17:37:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x20000) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000340)={0x2, 0x0, @ioapic={0xf000, 0xce00, 0xe000000000, 0x100, 0x0, [{0xfffffffffffffff9, 0x1, 0x3, [], 0x7}, {0x3, 0x1, 0xc7c, [], 0xffffffffffffea0c}, {0x100000001, 0x100000001, 0x58, [], 0x2}, {0x80, 0x5d200000000000, 0xec02, [], 0x80}, {0x0, 0x1, 0x9, [], 0x1}, {0x1, 0x244f000000000000, 0x7ff, [], 0x4}, {0x4, 0x79, 0x2, [], 0x3}, {0x3, 0x101, 0x7fffffff, [], 0xee}, {0x10000, 0x1, 0xfffffffffffffffb, [], 0x7}, {0x9, 0xfffffffffffffffa, 0x3, [], 0x5}, {0x0, 0x6, 0x9, [], 0x7}, {0x8, 0xc952, 0x101, [], 0x15}, {0x101, 0xfffffffffffffffa, 0x1, [], 0x8}, {0x9, 0x4, 0x80000001, [], 0x654}, {0x91, 0x8, 0x4, [], 0x3}, {0x0, 0x10, 0xffffffffffffffdd}, {0x2, 0xfffffffffffffffa, 0x3, [], 0x400}, {0xf787, 0x1ff, 0x1, [], 0x403f}, {0x8, 0x4, 0x7fff, [], 0x7}, {0x8, 0x2, 0xe9d, [], 0x8245}, {0x8, 0x7, 0x2, [], 0x50617c35}, {0x5, 0x7fffffff, 0xe17, [], 0x9fc8}, {0x2, 0x100, 0x401, [], 0x8aa}, {0x9, 0xfffffffffffffeff, 0x101, [], 0x9}]}}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x51, "57eed6c4f49bfa9fb144912247cf6b32bde29c3363581f0a89194d54a8515431866f891956dccd39e44540e2744e349550bde02aea057c6203a5108b775ce853ba22fe2c209a875e58c933372886c1f4c8"}, &(0x7f0000000240)=0x59) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000440)={r3, 0x5a, "06c0d78185d46cefa493878a9b6102787a9bca917614c3898625fd0bf23d4944a63ceb7d97a04f11f1f6f0523361cb55ba5d344ebc1ca9a791341ceb4feef96217a2fe3474f8592372ec361b46fd4ef9b432f1ea3d8e01c4771c"}, &(0x7f0000000280)=0x62) dup(r1) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 432.831214] binder: 29026:29028 transaction failed 29189/-22, size 0-0 line 2855 17:37:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryqtfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 432.888802] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 432.917936] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 432.934148] binder: 29026:29028 ioctl c0306201 200005c0 returned -14 17:37:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f00000004c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x0, 0x100000001, 0x800}, &(0x7f0000000440)=0x10) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x9, 0x6, 0x3, 0x4, 0x1, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="12634840020000000000000001000000000000000000000010000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="8561646600000000060000000000000001000000000000001300000000000000"], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="300800000000000040000000000000000000000000000004"], @ANYBLOB="05000000000000000d63000010630840020000000000000012634840040000000000000001000000000000000000000010000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00h\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\rc\x00\x00'], 0x181, 0xfffffdfd, &(0x7f0000000040)='K'}) write$FUSE_OPEN(r2, &(0x7f0000000480)={0x20, 0xfffffffffffffff5, 0x2, {0x0, 0x1}}, 0x20) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryp\nfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 432.972713] Error parsing options; rc = [-22] 17:37:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x350}}, 0x0) 17:37:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x31) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00') sendfile(r0, r1, &(0x7f0000000080), 0x1) 17:37:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797074667305", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.077897] binder: 29056:29060 transaction failed 29189/-22, size 0-0 line 2855 [ 433.117178] binder: 29056:29060 ioctl c0305302 20000000 returned -22 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryp%fs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) close(r0) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) [ 433.141582] binder: 29056:29060 ioctl c0306201 200005c0 returned -14 17:37:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797084667300", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.251372] binder: 29084:29085 ioctl c0306201 200005c0 returned -14 17:37:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='..\x00') utimensat(r1, &(0x7f0000000040)='\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x7530}}, 0x100) 17:37:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x25c}}, 0x0) 17:37:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 433.330949] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:37:59 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) getsockopt$inet6_dccp_buf(r2, 0x21, 0x8f, &(0x7f0000000340)=""/211, &(0x7f0000000040)=0xd3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt.s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.385383] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:37:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x10000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) mknod$loop(&(0x7f0000000640)='./file0\x00', 0x2, 0x1) r3 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x80000001, 0x549080) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000340)={0x0, 0x9, 0x200, 0x4dd9c879, 0x8, 0x8001, 0x4, 0x10001, 0xc04, 0xfffffffffffffffb, 0xff}, 0xb) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000380)={0x0, 0x24, 0x2, 0x3}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x105082) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000240)=0xb) r5 = memfd_create(&(0x7f00000002c0)="000000008c00000000000000000000", 0x1) setxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='com.apple.FinderInfo\x00', &(0x7f00000004c0)="5a7be9642f6c6f6f70cf69", 0xb, 0x1) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000600)={'ip6_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="37000000020000002cdd000000000000000000000000000305000000"]}) accept4(r5, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000580)=0x80, 0x800) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r4, &(0x7f0000000280)=0x1c00, 0x102004800) [ 433.430087] Error parsing options; rc = [-22] 17:37:59 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt/s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:37:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.478316] binder: 29115:29118 ioctl c0306201 200005c0 returned -14 17:37:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x7ffff000}}, 0x0) 17:37:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptqs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.589609] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000040)='K'}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000340)={{0x4, 0x3, 0x80, 0x3, 'syz0\x00', 0x100}, 0x0, 0x10000001, 0x3, r4, 0x9, 0x7, 'syz1\x00', &(0x7f0000000100)=['/dev/binder#\x00', ',%vboxnet0nodevppp1keyringkeyringkeyring\x00', '\x00', 'em1\x00', '\x00', '/dev/binder#\x00', 'eth1[lowlan1eth0/\x00', '@eth1!J\x00', '{\x00'], 0x65, [], [0x4, 0x7fffffff, 0x4089, 0xfffffffffffffff7]}) 17:38:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt\ns\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.631061] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 433.645608] print_req_error: I/O error, dev loop4, sector 14 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xe90}}, 0x0) [ 433.701531] binder: 29154:29160 ioctl c0306201 200005c0 returned -14 [ 433.731541] Error parsing options; rc = [-22] 17:38:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.757073] binder: 29154:29168 ioctl 5429 20000080 returned -22 [ 433.802260] binder: 29154:29160 ioctl c1105518 20000340 returned -22 17:38:00 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='fuse\x00', 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='-group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$sock_netdev_private(r0, 0x89fe, &(0x7f0000000040)="eb27bdd4e8991324e8a65f389ab01e83cb6174b356016e20c7777196fc0991e82d5ada9c59f5409581ce9dc27e47c31ee2518c92c073fb9a194d0785fd7ccbe3200c3815e275fd80d49273ed2ecfbc0c6b0bccd80bd6ab4248b49a4fd742686861ede81bcdf9d8291f1c5744c6e3aa212a0e23a6abf4a672d67b23e4d942da3b273432e76a64b9d2e640ea5ef45c150f1af477a16892b7852185d95d781d58687154dda91c") write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000280)={0x28, 0x2, 0x0, {0x1, 0xffffffffffffff7f}}, 0x28) 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:00 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) dup(0xffffffffffffff9c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:38:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt%s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:00 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x18, 0x11, "74a09cf67dc88020b06f82897e7bcaa4d751951e0351be2650ba8f267a24d688aa0a03f6e7babe235927a952ae14dfc0c4263051747527817471ffd232309577", "261c972c058d307ec10275b12eab9094ccc7822b884107bf7d33d013fbed9eab", [0x0, 0xdba]}) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) uname(&(0x7f0000000500)=""/227) 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfu\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 433.942186] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 433.957098] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xec0}}, 0x0) [ 434.041133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.056933] Error parsing options; rc = [-22] 17:38:00 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2000000000000801) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x20c, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0663044602000012"], 0x70, 0x0, &(0x7f0000000340)="fd2485a4bd2e306c449f92d45e6644b2ad3107d32e5b9a234e950052e2a8aadda9a72d08cba6ba42b056963c66a80a7b83d096edd8c1ae2925092de6e2424d2201aa508f592689100aa72fcd1932beb006388b6633d2755bca3cb21400227249bc01a28cb5f639148ab550289e176bb1"}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000440)={'filter\x00', 0xbc, "7abb407e9d4ca2fc480bd3ec80de7552d0d697aa467060f52f4f6b0ad68e9ed421c9d76cd180b6a6589d2ce0d3698e1d915652a82751ead0e70f66104a8b98baf6dc6d9c3f010c3f669711f565f5faeb5b73f586f98c23ecba64dc49a6a5a496584ece25e8a9655cad32b3e81c8d120fd8519af938f35b07d60d5744e1d47444ee6a42b784fe9855cc9bc946b28429493a944d73eaae7bc8ba548f45755662e40fa486e1098dc999db6c1ac374763c341e9cf899e7cc921d95487c73"}, &(0x7f0000000580)=0xe0) close(r0) r3 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400000000074f) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000200)) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x1) sendmsg$nl_generic(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x50400002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x2a, 0x20, 0x70bd2a, 0x25dfdbfb, {0xc}, [@nested={0x10, 0x4b, [@typed={0xc, 0x16, @u64=0x7}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=0x8) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000400)={0xa9, 0x0, 0x2}) [ 434.087013] binder: undelivered TRANSACTION_ERROR: 29189 17:38:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x0, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfl\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 434.220591] binder: 29217:29218 unknown command 1174692614 17:38:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xac0}}, 0x0) [ 434.270732] binder: 29217:29218 ioctl c0306201 200003c0 returned -22 [ 434.286019] binder: 29217:29225 ioctl 8912 400000000074f returned -22 [ 434.288914] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x0, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 434.327978] binder: 29217:29225 ioctl 40086432 20000200 returned -22 [ 434.362777] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:00 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x18, 0x11, "74a09cf67dc88020b06f82897e7bcaa4d751951e0351be2650ba8f267a24d688aa0a03f6e7babe235927a952ae14dfc0c4263051747527817471ffd232309577", "261c972c058d307ec10275b12eab9094ccc7822b884107bf7d33d013fbed9eab", [0x0, 0xdba]}) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r3, 0x401104000000016) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) uname(&(0x7f0000000500)=""/227) 17:38:00 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf.\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 434.372758] binder: 29217:29218 ioctl c0306201 200005c0 returned -11 [ 434.396243] Error parsing options; rc = [-22] [ 434.437429] binder: 29217:29225 ioctl c0185879 20000400 returned -22 [ 434.476729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:38:00 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x0, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797074667306", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 434.500305] binder: 29217:29225 unknown command 1174692614 [ 434.514901] binder: 29217:29225 ioctl c0306201 200003c0 returned -22 [ 434.533205] binder: 29217:29225 ioctl 8912 400000000074f returned -22 [ 434.595292] binder: 29217:29218 ioctl 40086432 20000200 returned -22 [ 434.622823] binder: 29217:29261 ioctl c0185879 20000400 returned -22 17:38:01 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0xffffffffffffffff, 0x2000000000000800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x0, 0x0, &(0x7f0000000300)}) close(r0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 17:38:01 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x0) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xd9c}}, 0x0) [ 434.796717] binder: 29267:29270 ioctl c0306201 200005c0 returned -14 17:38:01 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x0) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt%s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:01 executing program 0: setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000280)=""/170, 0x1000}, 0x18) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x1) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, [{}]}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000740)={0xffffffffffff8000, 0x7fff, 0xffffffff00000001}) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)="16ba5b13dbf56ee94f2fb9e4ad6860b043364630e9ef2a83b85910c5a5aa36775aee0d25eda9fd3804481b920cc7d807b58eddbc2c91b44e0210f2a04f0102b16d11f5ef3804bb6d0df14b3b9e4b87c4f3c27878a3133a262603e2403f441d99dc5bef6cae109535cf6f684267d37bfa3089dd5c744a63168d55cf5012f6817bc144bdc21e98bcbd9cefbb37af163f365eaf20e87182620b672a6f2f9ebb63b181c1f5e3dcd9fe4b9d608b3836b802c9a6cd96b11de4c3ac9179b2bfaf1db382e91dc97de739c927e889fd44a35884027ad4a658e9f77c2ebc9b9e8711eee42b", 0xe0}, {&(0x7f00000003c0)="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", 0xfe}, {&(0x7f00000001c0)="51c2219c4a13e0656abb0f0f3acd2ea9b3defbb7c1c0418f4b7e3e65c77c22dad600fb04e446ff7724f0def3b30e590670698ef6f16fec78d4001a6452f66dd0f96c6499e4da43602d64be69afa76c84b78029ae23bc25f9f18c72f31b908a69705800a2463d59aea9c3ad4426c6fccb8f3d5b", 0x73}, {&(0x7f0000000140)="b41516c152b29019d1d50dd7fd3de97dbcce86403c036e5f1c038a53bfacd7b1a03d25791970cfd3aac865228e807a1cbc", 0x31}, {&(0x7f00000004c0)="502ff5ffaa8b57a9d57164bf8a086b04e2e85ed226301880f9c57480492403c705f32f09b1f08d18d83ee8bc452c3294fbb6a1f17a02c6ec0d438601e84d5c30fccdac", 0x43}, {&(0x7f0000000540)="c38a31f2ee0e5579d710e6eb634c79136d0f50180197ba87ebc6431f95104b60f6b4cd88c6ba427f20cd6c91d130b10b82b22a99174cf977474d48e4335d2e40bf99ad8c7d9705ae95d873c8117d8c41403991777fef", 0x56}, {&(0x7f00000005c0)="59039539f84e56c8759b20358261544e128f68f1ad67a40e98c6c70bd8c5c8fc2f1ebc2f8b01d1928efc5c43c906347d828244fcc4a4aed364a9f22f6ee95cc709bf6b76439f67ecb001dee7e3e6361a9bd959e5da42ecb8e85af1cde0d66fc75d5e361addb0393dd55bdeff15cb05f8fbddb60eda8fd4ae81441e2251266b4f08d9a0a658ea8f44073abe9e959f29afc3ff1ede49a4da2c8297791a803788ce4875c13c7cae9f58421d0e6da8a35297d6961dbb0b7930de32d6eedf7b7956aa515dc4225b603d9f26938525864efbc8eb", 0xd1}], 0x7) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000780)) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000240)={0xde, 0x7}) [ 434.928743] cgroup: fork rejected by pids controller in /syz5 17:38:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt%s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x318}}, 0x0) 17:38:01 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x0) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf#\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg(r0, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="5087884c6811463a94", 0x9}, {&(0x7f0000000080)="65d7d28e92e0a342412a245b76365256cb1418615b9a621be6bd5de26e1161e31398d45149e5b82b44139ad9048901525ffa6ce1977dadf2d9c7fb395179c7a44721913d78a11c58c375c8a540037d0aa5", 0x51}, {&(0x7f0000000240)="20b150d6663c2da1bb69ba772ef7674145243b5b632669ecc66e7dfa4c2f2eeb2e6f2abbbe5c01e7b94494e74414c1e6c2982a2ad70d95e8058b1d6596d1d9b3a3339d6c58e55a8c39bb97488b79be99ec07066faa51c3cede63de0ad21842eb4d8164d2e0db4fdcb1b4611b27abf3ef3950c5274a32de76b11dd2ff6c9be08c171ffbe65d4fa400ab5a4ef81ac0f025d44c04b5e0b000dfb2d50444896355e671d8a0769408997cf0f3fae72bdacdaca367d481c4af5f8e1fc843679224707f1b1077a8f1d602982488b3df970c4ea9d9db8a16acb8176077a80ab03adb0d6f717e681a7f93262a41f63769f66d9333a8a25673bbd5f61af58004c876daaf8e9abc6b228d40f84bea3cc821b97983bbfc4f1f39332e46ec0c31ac59df1ba8681f2d0821927ec14345ac48bfe6041888dcfc4f002a85b95f1dd322442082ea1dc5c1adf62fd008729f1366ac3a45521ed2c684c4d8a7ed332de01481d8cf80f8578a9da6985a15c2ecbdac83e5fe9ada6467029b5aae23c49dee310fba7fed11fda6f96979e20974946c284c2f4bcdb77af69b743c08a102c5cdb6af35bae683abfad353b0a99b33b40bb78e6e9c72ef8efe8c49307503aceb9018dfee0ed0976fe265aa2f3e93cfade3de1bbded48a26cacf4ef3d0b95fa9aa28f06bf6cc89917d3344e50484a565470d1775153c41f55a49450e68ef248f478178f847877e3bb30efbe8501108b002ed269a04868426e3dffac4db19c6f813d929435d1dbdf565f6b06f79010b5fe6d14c0f2b36cf14ed8584c352c57c6cc47fea7ba53e6af068aee29c825be0bd8e4776965b2bf62bfe11a706bf87549761c1e0ccb4c4f73cf239deb010549a89de75742793f11c51d93e500cc0246dc3169b8f9b213eac9498f22c0f85b95dd0832d576247c66b0a928d1d0760eca0e00b1d1be1e09ff71ea1863f45a9694dbbd5c164128f453d28bb2697da57377799792168aa7b188bf71f2d06c248052b5614cab3f8be1fd09e7350aafdd0db444ed80e24bb69d7a60c16792523fe20c4054e99aa9c7af929de61b8914fe5028fd2b58b45bdaa63a36f7f61b28587f0be23cee5f426952251a4b8fb1b36ee4902f534495648d11c88352e6e5f0824f49c0f7351c2aa0837bb4bae07517be0ef1875d081d4f9cff23dd6fb6f2d7df5c5799bd04b0f5144d878e525cfda9ffbe3fb48bdcaded431540591e2a04a7b1634360853e3ed7854f084cc2ef5dd01947f155da4a41365e21a731f225b5777f8e458c8879299ffdca9cc6c599904c46b2bab3b02a76f6f80e992c71561e01a07f816922675e0c047027d2386edc3b9c47cac2bbd1ddee11a8edaa5d285802d8ba3663364316fb89428bec27738e2b1b4844f0a3925c66bf79f3fbb0e19e8392e68248b015cd11968455f5575ddcce5ae1e4d10e0a98d064ad323e97b96f3abd9984dc08e2e622f84c96c835833f4c9e5c2cf67354ce4d503ae995fdb03ae0f101b43d12325f5252d6b3353047d623fc1849e463863cdb97691d9288ee2fc560096545f72e806ea2611f78820406d865d2a54c11d493356e8b3042be421b83ab0f493fe25d464e36ac57af961ed751594ed2c59d18d273a9602e5eac2ef6546129fdf0c3ee0b33eacb12f50a4a71eba4d65512d38721e3f3e37aa250b4c2587204bd93982894dca9b771580e8cc78af916c8f7864073295854e3f7f5d55ade40e5f068aa1214572d236e0a3d432925041f9667cdef3cc80f730bd57c4a348686b1254d22790880e226299c2382b214925cf483fa82d4eb1b95f63f0eba513765efbca12d244cc1c4b780bdf0013714ae34131b6f1e6c8ed3800c07bb06f064ccf1118e431f935a2f4e44d1ca076017eea646a1bef57d16f0cc36759cc299160508599ecdfe2f038a290603ae11032e168906909dac895a15dd98166e9d2c5f5871b4e13b7017fd8793a67cd270f589673b3f9d8478c1d45ffe30aa957c0e5aa1a20ec9fab94373f72415e93f2146b46352b15af9e13da7330da982abfc225147fc6f1216847d36307a72cdfe4e5ec216b1b948704615d8f2ea119083123379ed3d764d36c418f87860a1a6e652a57325323bcab2eb497278d554612ff2baa8b34aab1fe1f68e3a93ac3ad16f0c977a384164d6789970018f7b529bf34283539313c616ea588ed85c42682eaeebf5ed7f30b278730b125d6ab262dde549040fcfe4984a5f851af6d05f6c347b4a310bad11e1b520a08553d42249f5b2698bf2fd70eef7b78b07149a45c18dd27990f4f7e9d967a966cf93b0bd689dbc1d4cc0c79b660f7384cf81a7aca5cd9aaeeacbbb846727360abe68377129a32c0c51e78b1c7952cfe3cb13aa133360f16c9f0a72eb8771503794dadc15b79dd86ee7a6bec898a9897950e00852862c86b2d58823ed4881e7aab9ebc261bc310f19d109d160f19ba5b6944c844999a8ae5a638dc7c00214660838c159a6bf4dd5dca7069d2322ffb9be1f343e8bca5faca1dd5f7e085c7fa702da811e0d4e8a853264097ff6d5fdfe0c7619b800d46027bacc7d695c0a4c575e81e72d3f3a5d0308c936d36f985c8a87624081d8bc9f200f6e082e664c65399c4e2a69dc35e87eafd1b8bcd35e032f29206779febf6d77647e1d4ff2f4e87a8b7722aa9085cf4824b0f6e4b48b078bf627934b317a589ff332faf5dbb7d52de013a202b4b361d38b13b6bccd13ab46ca64eeb77b42f4ab8d243f8dd2bd37474df9bbe0e189d0238a82a513cb89546f803a1f04e21865afdb9cfe30c459365513d366bda069f5cab3112df9d8cf84f1fea7417f68dd8ea105a3394511fe7614678af44ab5f32f25bdb40430d58afdcda97c2fe66f90fe6e1b910b594e7d1be1f7655242e70e765bcef3255cee1b730324390bfb90db4dd9e3f47bbb383e454314e46804ca9057735b33babae0aa40106f57fa48cee620b0a87cef690f3a4b48d4fadb15d53aeb92dbb72153da852e5cc7d6e1d6a3ada4f4162a09f921a9d69d9f2aafe3cc99b2b0fbb712311509de410964d36512be33bb3d112f26962cfe139e549246ad0f60a2a30302df8d25165b48d6e3026ee82fab0596c1c89d83344bcc1d38110171f55d368021b07cc975c34e619401a26f5b4ab37f798eed3233ba3e14ebdc6c80d583fb9c649996d3ccba24957b12636e04a4b47ecdb26000058eb067dfb2a80c0a9bf3ec2e56be63ce59df7a35087e16e49bc4c727efb747da34628458459d0d686d55c250d4f1f8079431d86ea5c813952931561613a56f021dbd0ffb6db8c1ea67abedc6dbadd4e4fbd86068b19d723eb1d6e8fa7abdf510494830b0a1071bbbfd57af1a128b0ef40967093867df35e68d703b362aaf592c313648f4ee242e32d6591faa00ce1ea8e213b9e3b0b72dc16c7c78216e3c61603cc3f192129f6fc23c8474e59fbff3b78576dfd56b024d306f10ac32682bf25eb2a97240bf375767df7dbd539426a1b25d6c339736d06ee85adb54cf14a56544013a710c248672b77ffba9632e19f4be29e2d25f1c56c51fc9b6f6913f516c01accec7972fc6c5418fb76a3a9bc50c46cff29e1e5af59cb798bf327a0014f6ab1b539b5b16914f396f1d6adbf2790bb75a6e81883b5e03bc430954f2142d274e1a6898950f0ebddd483b5e4fefe3296101c5fe8f644b4762ef0ae433d7da23e84b86ccab1ea5cd98fb66db19d005bac2bac678171f310689d68f6308698fa7f0eb6fba4b20755690b48096972545235d516a424484c9720716cbd4dbe33e1462bcc77bbdae400ea01da0363302187d72cf93bd3960f8c01f6bb973ddf4da0b3b8c7f51f4aba5eee00b2732ff0cee594f25898a48e36ddc4c7d0987b7743efd3e52881c1764d0821ee412ed85e41d83a64d660dd71ee3ba2df5912bd0fa5a17085d7d74180d2bb767c2ccb8d51e6468c74982b1ca0617f57147267833d81ef95713ed2baf1fcceafaee18e1e3f6ca89b9fa7de79cfd86ed9aedef97f8c825adc6f66e5a5df5bb3387b8df6eed89e8f9e272afe3aaf97d136292c70811b0efe8b71168a4b1377055e255dc393bf13ba87dc8c6bbd42a358a685cc38dcbd018dfee243f1ebdb42c9a73df99df37fa61973c21c3dd5f13340a7fc10a97a93c9447411a6065affc45b4d9b30391b088b822103a1d302d5b217fc077069bb1f0f729c6ba00445f417bb4be771ad3856903ce15a395b8b8d4e08b7b50475d5daf651b8a866e7d796d129fb3a59cb4878693e7e0520c6cccce9192ef9b5d345bc1467dc0693ef81f768ea5f7b16a77ca90ed129c7e3c52df1b5b5b27786eff200111c31a71bcc371015d7ed4ee047a0d5a79d057c4478462808eb444d542e7f5885c0e8af36b890c236f3d6d959753c612bde4d7a8c9ce76b4badafc3daf71ad3ff5eaa6b03a471371bebfa219fd01a3d7bc36b8a9af87ffa6d427eea288563a4fe8e6c4d06321d2657a6ef986c69f8045dbcf3a5da5c85a1bb8e9dd7d338bf46421afb1a4ba59ed6ed11253ba205a868c65f6490619efc9fa43a8a4e49836698aaba16e9606c94ed228b97a27521f6cb6aabae48d3318649047058b4eda233d1510f3ba845de0d92e2a7040fbe7df82a2d2c36cf5c8b20243df1ab67e7a7798c59af5a4a7cdc91b0cdd31af90d29036743eb84d542778581837ae10b124476ca59b299e1cd031fe85093b674eaa6e0b0f5b61e8a4fc05a6dfdeaafcde75bcee4b57b823e0e05ee93202ad9957c2c7cb120c035cf00142a8f0de9d33fec0674d2029c542541de2dba26b219cc9f5849012a7bc342962044d2b663006c99230d9c2d11449a6d55fa6cb90ce1606836c4d04d8a2e041b7ff1f5952145be91ebf67a6f2a2c5a9b703bd154f3fa2bdeb2114dd5e0422618865536a8133a41ac3320a75751d07b1abca273a5026fe801dd328a43228693452dbf3835c91163eb51def849699df23abf1cc912abbe5242d111d9eac4d157e62bdf40d39aa324a92901b17ea14ddcd5a77af47f8b9cdb90f2a0050e8aa2fc1d7fa253c8b9ea8b52b83802e9d05734e9986b9d4ccf6262b85aab16f73b1cc33d58905de10858cafac071d712ae6e757217572b97e91509992fc428132380a2f4dac2d7ac4f248f68b1e891190cd6d9be920b93795d54e9d768bf83b32c6447ea7fdfd37fe92990bc81685a1d5c22ef0ecd406abaa3a1e0b439f8a539228d8902b37df3580d5a458ed79f5aa1363964bcbc4228f97bfa9f23ce4d1258ac94a8f782eb777ef4c7d512f99600ac704b45ca89cd61129244da11c6709c7ab2ec6b739aa70fc623ec887d65722118af6f9cc5625406df25618dddd3563cb53d0f784eb060d857b083919b022763e4e5ef2d0d84f2cc6208d6453a4181d810d331bf7bc2472f3f09c9d65f078b4acf15641358a26cd4ef606c5fbd597392be98192a766fe1701d95844004ec2bfc2632e352a14aeb7304f5081738e2faaf03496dbb00a23b952d3340fca112ac2dd77d6e0d8f868b80aac73821b86c293c7cade2294144139f1e5a68773e5e2309364d0e314b0a682077266e14479d426e003be662af593b3e455a61893c732ebe20cb509b8ee1469e2e2192c6620b98b01ad7054978e74b4002ccabe695a8a05fbebcd1e687153d122998c1673d6bfac08c7fc2d1761f6c73c4130eddfd2f629dadbf4d59c17df7601ca78444cf4245cfab36b38b1cc757e93814d3f379c45dc556d197aaf88a81b5dc51ec6243ac5ffd44270bf7a352bbaadf9c4a72885af8e939e15e5c6c1e45ec219ef1c", 0x1000}, {&(0x7f0000000100)="1ce6d55b8b93107eaa29df0c457a19c41bd0c5c8a43e98338f", 0x19}], 0x4, &(0x7f0000003000)=[{0xf8, 0x6, 0x10000, "08bbf1da829b1304aa46950412633627ba6bb10ba0ee1ef4117baa88a698b8d31ea544a95529ae9e07f030cd3d2cbb1bce1606e70bd20c1d9752a3453104b89db684928cfe158d4c974550c6ea1688a0684c3275a63fab9009b41e1b16e556641b8e2ed52b10b785a9cb1ccf1a0c3db847ab4ad67a6835f552c638c12f4cc6656e8bd0b53398df8a5b6182caf5ec19eb67a17177603b317f5c4abb03b48400d3f615f7d76ed032c5e9ce6f5d49b60475ee0415532b407c1c6e6a671fb8a8f2de3f200ba9426ff5be9bcfc7d8f7cd68170b3de4d14766c48f8f7639c165cd1e7132e0c001e276f3"}, {0xc8, 0x116, 0x8, "51eb9c80f8e922b07c906fa0bd4d9044a6b80b4af6d72c9388aaafca014985e813cedc7e3fd5402c212c54c81f0a205a9aad5c4da806df97a8bd6d01c9dc23dea06c9b4b6f50fe45d833dab25fe493b932d0f05e2b0c20cedd59b6d27b5b186655e6d3e30d72a4bcf6877ae7a29a20ac59ba1f67857050d652e72bf5fbefddbe1d263ba25746977a187195faf1af207ff13890f15dee4e1725e62a09a543fc6ce776fd36967811b3b03c6441301fe2ad9f4cf71790f40263"}, {0x18, 0xff, 0x18a3, "d5f0ec"}, {0x1010, 0x13f, 0x5, "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"}, {0x18, 0x119, 0x7, "a39898ba"}, {0x40, 0x116, 0x7, "1bc825dc117ff66f02bd574c8c3ced3f040914890892fb28804268055a92d8bb7513acf82766510dcac445"}], 0x1240, 0x10}, 0x3f}, {{&(0x7f0000001240)=@hci={0x1f, r1, 0x1}, 0x80, &(0x7f0000000180)=[{&(0x7f00000012c0)="3d0693764220ff8509dbeb5a5e5ce8c1c0b69a91e063751561fefd0bdf5cb83eedfe8f767c12736d3b56dfcd319ccaa83fa595751ef0c29e1abcf02d514bcd397b18beb8bdc18cc04079c49a10bfb2e1dcf69761cd6290c5efd953e3c4318fb9733dda69203fa6a1b1c591d2aef8e40f27ee6253ed9e6e4eb5fbd80074383bc7426364b26038f8f44fbd02c1c2eb3810320c5bbadc8c00fb3eeb73224830f19c8ac6fcfbcdff6c383d003392f9573701cdce444bde74d66e1dc6459ecea9f5f7e8534393df98d6cb489f978b90b5cddc", 0xd0}, {&(0x7f00000013c0)="489b175ec151374e86bbc3759adc8ba58aedc66acef5836c3e94c649919c286ca9b4c4c19c6392ad846fc9c772ebaed4a2fc954b311bc8aba18ee26eafbdbb1dafb7aac0a3a59ddf1e7cf0225d328ebecc1c53b46170855a87d59b2b091346e2bd94c5af0fd24aee91ead70ccb9e4b9ef405fadff1abd37ed1997a7ceea8d9d730c55c828dfa1298719ac2ab64efe89a50f9ffce52e71c990824e5b421ea", 0x9e}, {&(0x7f0000001480)="ab017526181168daec554971a00a6ac5d4e0381eef216fa62815fc2a30e01cf4f05cc505b99cb83777d4f12c401523d52c8172c5a6a9f79cbcd39f2817e198bee7128bd219b9845e7b329dde3a92dd24f250f8203b1498cea41b7dc7ba38c2fe77d6bb8b10af2b836b89673c3225a93a15c1bea8f12a8cf519dc51459de50c51be4bbded1c27151cc5375f963d70fae884b953e7f06736451d292a5b2d82923a824beeeb5c3690d17e9f62651fbf7974fc43e7ade2a9a6f3a784821d86b2d026d277e68c1ce698077ffd027d17dd0b276c7ee1d348fc820adbaf1483dd90e9b4f3e2", 0xe2}], 0x3, &(0x7f0000004240)=[{0x50, 0x108, 0x0, "4f1a50c4e28c69e66df6ce83846b1b897a7ab46f142f50e4287865dc23a21f799056f51f6eb07cf8df9a77b7fd8816367f88b6977f53dbe04ec1f1f5"}, {0x90, 0x11e, 0x7, "7d37c8f629b6ce22d876f038bd46619efa8cbccd4c8d1366f24ab9fd8eb33d98aa8b32575f41c4cd9ce5cbc3619eae1b14150d06e0e2bf2b1feb22366fca0a491371ed6fa39a9a498ddf86c715bcfc93654cd5250a78db0c99e1d9512b83fbee4fb90e73fd382c6582bbd85c5a2770ae350504ef132113af711571d3591737"}, {0x18, 0x1ff, 0x1, "148b5b0438e431"}, {0x50, 0x3a, 0x1, "bded3c45db0f89252dcec98e9ea58387bfec2e1a4466f581f1d4a2210031b232e54a3e145791d6215f75bacb077612eb06c4106887294804e9e6f0e1b6"}, {0x1010, 0x101, 0x1, "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"}], 0x1158, 0x20000000}, 0x6}, {{&(0x7f0000001580)=@rc={0x1f, {0xb37, 0xffffffffffff7fd4, 0x5, 0x57d, 0x1, 0x6}, 0x9}, 0x80, &(0x7f0000001900)=[{&(0x7f00000062c0)="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", 0x1000}, {&(0x7f0000001600)="f8b860dcb3296f9a30688435312813bb810a3a398e7d", 0x16}, {&(0x7f0000001640)="ca8b6e5a3fbb287ac87e80fa1e4016f0f385168e6e3390c6c3869db3c4b3056a71b6f08b6a13dafcce49feaf59e3e52fbd16b5c8492b41d1455db416d4d328c23b2031b33562a6652449971135d29cc52e1adff418cc15df315ce4", 0x5b}, {&(0x7f0000008000)="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", 0x1000}, {&(0x7f00000016c0)="d3407401302f66a1e2086ba94deaf76556eb015fee36f4b5911a66", 0x1b}, {&(0x7f0000001700)="30cfa32aa24dc8b3047b912a61f5cd2391fa42d299bd5d218a9021d9d9d8b74eca128a62597fe5ec97e24edb3507660616b8890d96bc3ee666d1a3107f63f3e0953062d67710269e65", 0x49}, {&(0x7f0000001780)="d71afb13db0997c7f3ce2cd721b5a0f55ed5c000b8591b4b81bf371b9cbbd49ddce34c0028df389f366331cc7b7bf3b11045c7dcff123ae31bd1bb09945b30b5cd074b5c0ac291b51f833fd0f2e4c267c847e9b271999980bdbcebc39a8da1911ec842ba4c847b9d3dcfc5acd49ed8d6a0da36e9e783e8c53ad9defbdbf9b52b09375445f1534c85f02321c8aad894187a63f11abee22e6c3bdd645bcd06c7021c820e6f3251c75ee69dd881de5a71db42b608f171a1a495bef5208f3043321e733899326ccfe5b963199d4daff510fe5c355049683f102d4ce4e9dbf1bcff3cf30dc1759e3e57f3b0968e5d355a5af02eae186c6bd86e", 0xf7}, {&(0x7f0000001880)="c974dced02c0d40a05499bd0bf8ae6f306238290960b9adc1e631a8421d5e3471ce648a1837a5a75bc60b0cda7b610a66cfd0b2698ad2bdaa310cf498a363e4c77c77e5e201aec0f1793b31774496f42a95a63a8e83ff13ac283de1b940104d76cfc90d41e9b9205eb4b66", 0x6b}], 0x8, &(0x7f0000009000)=[{0x30, 0x117, 0x2, "fea1d0a87f54382962cea049157954fa4d8227489d34a4d7fb177a"}, {0xe8, 0x111, 0x4, "7ac604803689a952d3e3f266a97a412daaa9050ae6138fc9bfacd76238f4ded3b4c18463371491adbaa42d00e408f0fbe538f2b19494711033021be01b5f3b489195d79598380f0802198cc0e6595db437bba08dc4fd8d810c902091727fcbf4e1c5f4fe1762c5997c9810d2c2c370255fa2bd2a6e0869420f5435183efa61d7aea60b9e13baf7006700af5e5c57bb934168a6776a7a5c5311c487733a2f0135f69303e05a02cdb591e0bac9585621f27c33de99226ea07de0f0acc316eeeb5a96e00f41269fc059ed4e9e8d75e288cf30ae8db130c97c71"}, {0x88, 0x13b, 0x200, "4243ded970dee28505a4dec152595a4030f95fbc0a646ef0ae6b5748305e4fa96809acff3cd453184bb9e8439e51f03b85548cff2a37fe186e4493ac7732570c79f95cddd632ad986096233b0db56ce4a48cb0e9a942c9dae113ec66c09da86479f46e2ca04f5f69593faf2ab0b372fa1dd76eee52953b"}, {0xa0, 0x1, 0x3, "7cc27158d16568cd63a44e70f3a57ca26d09b17758826646efd3015c8c7ca1db41c005fef75e7b75fc5601ae11172d51b069ef6e89a39f7d1d596276a66e69148763c5ca2de097c353c85e3a4b317bcdfe4c92371ec78dbbf10fcc9be242ab832a8c7d83a1d4de61b9629fd732399d77506822ae4bc5cfeb17f72e34ab24f22db3b6714c38eb6e0426c98b6ad8798a"}, {0x98, 0x10d, 0x8, "03fedc3f6972d3e411d3067aa6184b111440882298122c4624410140abbf14db8d06de3157dc86ece3d1d71bd9c62fc4f567a7a374720a1ac9055c2a6ad6fb2e366c508609663126b3f986dee7a1d5f88e7caf1ea9a74ee87a23fc79ca256dda7639d3038655ed8381e8308040e51e9d6ebae490d8bd67defb6637a41a2a51c6dc6202"}, {0xb0, 0x84, 0xfc, "38a16795ce9cb0a4f722dc643a40f0104d92ee39bd1a1a46dd704f49cc3eda5b1daa1d6004287bf93519d5449521c15db752e0c1ffe5ad13ded00f56a744272f791b7ed405245100b843ca78e47982856c57755acf32a19d27afc47969df0637928e61a990fe36b6b426f0a04d6de1010706238d378d0a6a3c5169e48a022b5e38e6a5719f5a205a1f96faffbf601086288c37b300e10fe6b0babc06c9d0"}, {0x1010, 0x117, 0x835, "996f44962a01ef4317851bb6b6e8f439e33fb0707bd9f089c5aac6396091e3be5df5ce950c2d41bedaffc711b0fbe7b6f7509215df551d148bc43f0baa7983ab202e99ae29b149e6ec3b9c52b6c4bbd198e43d7ac07401e9186e8503ac805796fc322e48b12408283377012a98654e7db499a9494ffdbc9fec3014371e4b5fa1de08576de3c4ffe47914b7f7bca671a7aafeee240206c3d3667c871a1d8f4867d80d8a17027a780a50a60093c1be42c2d760ee7fdb6d068772fc845106161e4e1d095c2391f5050818f913bd197af01e81e43135ca66406fbeb35b09b7cf8988ab17be1c6e048288b44add4ae69c1a9cd49dc1cae8c76369ed9e595f4fd36807cc98bc88517cfab77b757d3713f077a6a907736a5fb56bc7bca107a3c7435104e80f99fef37ed8cdc82f1d991d7165e938030e1aa6206dc9e07211f458d43ce9f7a20fa7f16d5cfb46e3a0c5f78e4b5ac7f9f4c8731f18f08a60aea76d80c918fb02bb39a9f6e1526f21d4b72a6079dd75e3d304413fa0b747dc1e501213884bf77ebf1724c53690a2728502ba9f3490221fed750a527ee37452d11fd6b70ca94cc42840ebde68c574c59d57880b49b0bb40acc3b86a1047a7014bf7b59d237c02c7703b11caa7c4a18c4361c2555feb8df86479ceae55093093f348d6efbe863f4342e987aa2740546cc739dac62530cdd3473838ecd988ad064a968eb114ff1557222e225e22329c8e3b800f144dd2e6d3cf4e17b3268bb6b22b315e0491c4138a097b708343a255c70c43f53127dc07146dd2e599f07727e88a3c301871244a498936a6ded46eabef59c2ae14db05ba68fc5d6dfdc4de4aca4020f1664ce4c90b901fc963622f75a517659062b9ad58ac7337129a7fa7fc355b35480d1ed7d34478e03182fe7ab60eeecf4bfaca7f9c8a949e6d41dac254e17e307b3e4b54bebbce172753396b1e11a588e39189a48d893fe9b5ecc78133f9c94ad7dfa146e2e9895de7c09243bea82be45d041bd715ac11bf39cd6a93f4b6c461ad22f73ef3e466483ecd93cf1ee88aafee489669842e6845ef4a7e8ebcdb86e4c9222dfe3e57ea49b2b1f72a2eae990b54d073ec5f03d6fe9c28e5952f21e042972e626adc43f760441cbb3e84c96f45ac4e2212a944bfd3e1b0f20156b0d1c3127eb9d3f4c531dbd76822a4c2053371d84ab445c10c1372fe0948c20c044fa896171ba89e76f14ed967b54053c8025411690cf6eb3d76efd4342b1fd17c49dea9e266a2bcf2aa66b6eb6748d61acf78a7adf756dae15e1f019f4bdeedc80346a387e3c122ab31850bc93d20a5f5a776bec698124eb38442363f44c3cccdb81308adaa85a748c3e8e0963e37a208b1f3aa51bd172ab5edca9d8878d91fddf93df7e6501356d5c33585705e0d067ab87f00e2b2195ee05a709abcb00722f0076167fbf1e22dad6f53245810f2545a320fef12d2e83fea1aa2b4c2f89e2b7aa54ea9774d75b3cf3fe7c843ed87227283a397f719f06340bcc50f9926ecd2781146356bd56256ec2d477d09f1466d1deaab8938af86a73bfd69c8b0f0d0aa0d9cc122ed49ca9ce43a35d0213ce45048855fbce3ea027b6dc5080100f36cf27ffa6059a22e1f80f4b8e67317d780e7ddc03f0fd1be6eb62ac48f00a6628f316156ff9118d142a0641804fdd50df6ce468bb15b7f8d9d291f099f83d0a888ebe61599dc0bab621eded24da5996fb968e3324975c25a02311a80d583603d3b6cfd3ef901c828905ba3951f4d9b032fe80eac4437c166ec9dea7331765f32b2ee85aa34bd4b3771d52cf781c4d327cf18c878eaf2f0a07f6c6d962440ecd944ec1da40aee9159b5d2c84802634705b647565e0352c54f6321c48f79b533d7e13de6d330c58f360cd5c988fa92a26945d45d28008fccd45991be321c92fc97ad22f401b3ceb737eede9185b01abfdb1f7e4419f09295d9a9ce72e2d65eb6b66b06318a1d8d1f4ec64572ce0925bd3e783562c5a6af7bb5d76440c89a9765192d31b8a1d3bec9a4b334e7069cf8234a259564d22e4a465e934eb4d7160e45971afb1eef21c976272b141a6de3063811fc50ee3a2602e80197a095cea782d0b84036b2c1db2bdc6417f5dc8136c1eba814553b76e5a7f91f0272b9c296be997af0f8eb5450cc1b838898cf707ffab480d7a896fb68fb565e8524596f2dc10897f39dd1db81979d7548c8305576bb7e237c4c9d114e5baba8836abf93e58adb212593409456e9a2d8a538e5f914e91340de5cf665d41378a994ed2f3a23b743aa8b36dbbe8ffc81af020700115675a2eeec085403f1c6a19f76d9f9343972125d06992392c268df0b8d780e5aab194c3dd9de89d52214a70fb1060238dda34baa11f047a9fb1184de0bc4928846a388ab874b1b642b0b6d504cee3151ce4de8f3f5323126f41c9410fb7789e9a7374b2ae863817dab05b379a399da236ee3faa4047b4a4f93c93008828c587b41bf5a51a01ef6f1d1acea4a1b42ba6c82dc247bd975ab3b07fd783bc0678abdbf6ccc904937839dafcf59b8aca7a16ef350a23c6bbdbe30d873a6b97d64f7a714c630c2ffd7cf1a5143f2a0a7634806d9d6f8ba8f7a8a971217833c032600dee0818d0a09334085cc184f8f7690ab1670731bc62e63062a231f4ae97ec1e4b1fff7df13c353afc6b1809c011c6f9e2551424ee6db09ac5ff2821f56723e21fb978078c9a55df826e588b7422c51088710def12d7abfb1b99bb14bb3e47b8ffdcb800c917e6e184839c7e5de6fcaf6af1a423b36cd7b4ccf32e2435c2fdd73e26c8e280771394c22b88af63dde6d5a5f485eeeb7301aed9e0acb5379bf1667e4482c2272da6741f0fe0f7f086dc254f212a7d9888259c0c9af9b519e7e03485664a52749103e47da864e5c0c8a743ea0cc0504e78c6726a56626f785cdc71584752b629e8c59f8e532c0743e5912339f2ae57f71f9b298ab462da80a9583e57ec7c47f0c10cbf0703e0c3786afbde8979d7afc7e03f5889151e79bd82745002b1124f4f36fc55f6f25797ed00ed8301273088ed3b1942f305e4ef6e5c94cc514e0d065ca33791afbba9e2ba2c131d1078673a19d5de6f24e1088605c7a124b1c70231ecf89712585cd135bdfa114b5b2b40f2b98c75a2ca845bb77e7e670db4c24bc30273e227f3e95d482b9362812ac557fec2fa095cc0f8a989583b6ecc80679949bc795b9ef10b3b2da0580c14e458794d6336222113c0183ed8bcd004a9a969b5360d39ebdebd51deb9d8cb05417a34c981c7c42643cf71a5e5784135ee6d8172fed4a0de4d2ab1aa09a1ea7ea84686fd0661ad6a98cae63c9f6cab18e755f84361f90efa36a573178c34c4fef675beb405882bc07f86db747f7ee397ba803690a45b586923861aba0487fc8b3f37bb4615fb12df537e2cc32fb34068045d9a4ca8eaa80af807351ef9d4811529eebd98bf544be102d133eda2fc8c110b289147eabd19e6bbe665f17d7ec2629bc908cea4d32909b49a517fddaa186c6b5aa9423eeec7621dd29e1bc935784962d8f73a30c31eb8171c1b42af4f75724a92dcd48918d98bcb19741dac2d5be73d8e46bc2168746738bc2fe66bf800fbe19c6942555a17b6a4a04e7625d55c3b065dcd2d121dc206ef0ce187a1a7bff92c0a5cc540a56c8641cc6ee583dc5de73a644c6ce5f0738acef9dfe945fb0858b33b08be1abcd5cc7a79b2d6c37b91ea4a01c380cb97950b95305a9cff7c795a6530d83345096ca978d46c9c3d16c2cda47ad075096acdc2cf95f58306d10954d281fdd53edb9aa1228f8570a8b0e68a5aa2a5916c340432bf6ae1b5b85202d9019636ae69bc0352e4e394bc48aecb158ae2c869381a0592fbca502373e1ced523be0847f591392ffc1c223e70bb2d2983abd3867d4821ba67f2c1fc785df1c9976fef43dd7854ce63c10ec57eb26c95fab1dce6ba6777fe7cc3af89e55d520dae4fc033a4c87accc409f1dde07d436c27329f12dedb0ce24af057bcf48ce3110d5220dfa10445c5e03c450d2b0438dace73f91fbf59f22d8efb45c710e2a8de4ec3be08d6319f74860a177041421ffcb13c787be43cdde99c92b89b8393704b93b3c6f99df58373c8f70f0465ca81bac4aa0a59fb193fb068ea7a52147e4ca13b25fdcf49ba491aed713fff34e14fb19b697f0446dc46236c08cc24ed53d9cdd052f6179a6b3e4ad832826dfa8d50f95ec05a3c36858c82d9c068143b3c3675a5c1737cb480833929068454ab707d0e0ceef41e4318609cae28ef51f1c12331872de88c61155329b1ad01bbc0f9732bb855089ea8195967afa7aeb1c20ad377ce9c09b7a3c44e23d4e2c52cf8b7cfedc6b70e6516ddd23f571589cf7808d9beb6c084cdf1963d1ab4d91c10e26cd645ea048c51a2bfbc6ce1fb7ef45ca086836d9b58823888d5cd46f308f1e46cc9e66c957fef615aa8d820b5f07378524e01991a7eddc60bf38299db08de60efde769950d0d9076ffc6270aa8eb0bc15c3adc5216f4b0f67af818cd7dffe3e626577157792d3cfcd351814bd6a75ea3d4a02ec941799b12ca8b0ad2eef8f908f4e13df93d3c1af2f76d37b22cf71ea63e7b63a26f39f45a32ef557466c953afdf9daf076468ce7825342cf1e898b35b4c55f800ab422f9edb9832c23a99802e84b7de42cbf44b0755802849352ca1dc3d284b1ef03625abb7c4e4b3453f7509d105e5a86f531d1a96739fe3506491ec78ce39bdeff04064ffdce4b8953fa8aa5326d5a9a56f2162350a51d86c5947ee4366da5d95869c9f78e202de0c0fdb6b93681454a8202e9b0875290f68cfe5f367a78262cd924b7ec276cd22293e0e0cbce7534282d5da8c2fe3e82e1980d6b43f0ebc8ba3081dd4d25ec9ec5a7a9b4f4e08221ce412e9501852e7cd2aee0e0d730a44ac38079156f31cb222c3dbbc7fa29fb3f551ffbd68f16354365ba732300dad1d7969d71b732933fca8a37253c6c2ebc603480feb8755397efc1a87113779f2500ee45804730ad30c40f0dbe6c756660b90f0f0b0f3011159be84896ebeca61bd0da4449bffeb0203507015d576ecd21450c1b39e7e73e460ea3589f238702b61fddf3b9c254e280307299b1b98bc589c29ffd322c66ec9bf73adb55cbade6b98b3316c817694d12521f42869de20feeb2ae77f083235f2dc7dc9282f88a30f51d4ef225d737e45c35561375a61f24312f3481eff28a1b7e825be20be9ca7a7535c8f62ee3e5edb3079f027a7a3199eae0551bd34199ba17d81dca044a3b885e2d8a5079b77acedc2185c4835daacdad49cab2e1c3be37627112afb60e060bb315ae22d607ca01a0105c342b5301876432a87f94d1b39513da493af34af019f3eddf7f80566806e06fbfcfd6d378fea4ac93b2155d7c48b1fe3e84f7fbb67842f4c098b027a7f0be448b77e91629f085bfa4abe36926c23b430488ebc14f24f75848ab60ed06dc859c7b48838d2d62033c666aeb4c15a7b1aeca0dcf668eeb558486b2e72fd5fa08cf90c2ee3e172bcae63a87c73d6f6bd1b5b4e9505a6066c1cdb610d2abff61aa622bd3f31018e88b8c1270d3df4e61d2913b9f224d2302c0002e48982fe0486707e6567cb12c27c50f9cbb0c42449afb39cd23716ea09f3fb448bee5dacfb9d7f8990b70bd80bccd98bf8d3a2a4ecd5fc2ae7423c9c822e3ca12ff6acdeb2b199504f39071cc8b4feb42fbcba8f5f89491a8699f7f53ed502e633a5ce1f79033e981f2ffe83b823bb22f0e1491eb8673b31ea0a0be142"}, {0xc0, 0x0, 0xfffffffffffffffc, "e2bea4cf225b1b79814cc6f4f3ddd4423fefe9ae9e10bd81c4d166325fc569cc58a39c547effb852bd93763e640aecc5734ec5c0b1c5272e181e6a21be9567bb0ac887a44ccef94649381c22730fb85e11827becae432fca52a7437c5fd9fa0e8b70240cf1791bbdde8fff8b9da35705dbabb078a22df08698fdc3338c1cea2552afd58be02bcc55ffd5064ff1c8c4f91e34c122a97d5a2f82654d2659f56ed1a7c53b1536e8f51ee3c39321929e"}], 0x1458, 0x4000010}, 0x92}, {{&(0x7f0000001980)=@in6={0xa, 0x4e22, 0x3f, @mcast1, 0xfffffffffffffffc}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001a00)="8d161efb186a8f0239422d3c1093edda", 0x10}, {&(0x7f0000001a40)="be69c1f7851a3863d2b7089afc612a8b58f50c7a7f977920e5b7bb167142b1ec085bc01b88d8de1e852fdd8c755caead43950ededa0582a519c71553e709be1f816cb1030e6007d74c551d3d954ab699dcbed211e8c271bcfd509b10f16a397441e54ab44aa35a", 0x67}, {&(0x7f0000001ac0)="d1fe464fd43b96a27ff300", 0xb}, {&(0x7f0000001b00)="de8cb69e2a1410ded5e8838d2a571a2c38fe40ee", 0x14}, {&(0x7f0000001b40)="9ed0f965fd1fb963e4824ec260b6ec46b1848d0737d6c62fa63d79968415c12e4804ae9154bd064c18a294652bbed7ffd8241d1710c9203dcae21ca305d07ff0ee5217ad45fbd888e3c1ce38a01fc7d7eb4a2d3e13c4e4508614d45be197070e422d23d406193bbf3c21982a1515dc3ddb4244c81e2cd570581746048f3166420113ba07408016d2443bde83e226f534cd3045cb08", 0x95}, {&(0x7f0000001c00)="b6bd68e6f8b7a0385ecbbb0c596bd812e53a4de3db40a518693ca21e57f9609f799a589c183a1aae8d3ffb6fef9b2d8f065a0479d960862bffb894250d42d3cd7d9e3f253393c137b1bd355cf89708482a699d264a7f9216c92f7476c133f0ff3eb3ef493862fc7a433e9b524fe5cdf36fab37b793ac33bed302dae62b706e7f24954876f178d557677019f5c3419e4dd3f20c73dccd4edd51bb1367f066408239c6e5c4307d661a7b38fd17259c394449bb5c3760e4607f7c8bf66fb220a7880086efbebe381c8b0a776717646673b9dc673fa1b0e16d0d5e", 0xd9}, {&(0x7f0000001d00)}, {&(0x7f0000001d40)="fde1e69ef35a977a29633438b299c6f111868f003b2372f5f96393b293228a33d612f3233b24acd44b7bee1af5f66706a97de59dfd097d77cf56ad6156e2b1dde7e893fe69f36956c41482a73221", 0x4e}, {&(0x7f0000001dc0)="dc8a2d45776cde826df600f2f409d39062bd639f753a8a1183f4c40fa5a5bcf3b2345a56967545ae400c7d50e5d17527cd59472a9ca62e3f595e3d5350c7b5951905c9423141211bfcafef9e60afeda53fc4c9754ddd62cc9a91d5ebceede22a7d743158675bb249994dbbce3f669ce68fdec40bb92ca18973f33a076806f55561c67d84ef448e44f064bc8b42", 0x8d}], 0x9, &(0x7f0000002080)=[{0x60, 0x112, 0x5, "75f1f38e6c848b0b4f484f75ab7ece10977f9eee2a9519f756fdc3b6710fb5110cc44aa5d57166a0764ccab23296534e804c487bb903bbf4a232060ca363e34c7b40f78efb131698e12bc35bec83bf96"}, {0x110, 0x10b, 0x79a, "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"}, {0x108, 0x197, 0xffff, "f160011deaedf261508dbe1c5200a77418abf9f90a663f0ae38c50088722a55eb22f6cd7137348bb20cba7e2ee0bef7c65f29ab6eb465cbeb734bab6fc584f1824d085070350db52fb8899a5ccee6084318cc107d319242f9d25873e42ba5db7194e5bce5da55bea13e80d1ea1b163e4b4dd60e58c56493f5d87ea956d94241330d931d7d46f851f8f85db6f7c1f9757a2b5b98c9cc9f63bbbc3efee2039d29341f70807ba80722a16bb5db6b0eada2a4d6e59d701ded6162a0a4627691c53ac2d967b939b32faf8cca97c730747d00f8405338ec255ab2cdcbba63bb971aa0a2ac1d65d3d7548d6dbee9b1b7a95749bb13a65"}, {0xe8, 0x18f, 0x1, "159579468725b79cafbd29458deaf1c1a96370b62ff7b23d0626ff25bcc94c71264a414d488bb388869c900cfd2a55ac6a569250238fb43f4a1cdebd7ad036b3d75276594c9474897792ec47744e99ceac345c3f047dd243c219fab3ad4dac74030133f40e2c64eb8e94271be465491a2ff7fe3a6485a39c5e1fc424ebe1f2a9aa1f4db827551617f36a075d4688af77216887d451cf875cdc4d6936d1975dbac2e575500999458b876c2a1f1e92dbb40f8ee7b662b29f5163a4fb51b6f5297dff2077ba5c3096b945cbc4a6f126b6b8985629de9b6adc"}], 0x360, 0x10}, 0xc223}], 0x4, 0x40800) bind$can_raw(r2, &(0x7f0000010ff0), 0x10) recvmmsg(r2, &(0x7f0000006000)=[{{&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000002f00)=""/149, 0x95}}], 0x1, 0x0, &(0x7f0000006280)={0x77359400}) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}}, 0x0) 17:38:02 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x9e0}}, 0x0) 17:38:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecrypt%s\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x444}}, 0x0) 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x734}}, 0x0) 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x0, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 436.156142] device bridge_slave_1 left promiscuous mode [ 436.161655] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.215844] device bridge_slave_0 left promiscuous mode [ 436.221306] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.310821] team0 (unregistering): Port device team_slave_1 removed [ 436.319753] team0 (unregistering): Port device team_slave_0 removed [ 436.329256] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 436.398069] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 436.452678] bond0 (unregistering): Released all slaves [ 437.253039] IPVS: ftp: loaded support on port[0] = 21 [ 437.262458] IPVS: ftp: loaded support on port[0] = 21 [ 437.262474] IPVS: ftp: loaded support on port[0] = 21 [ 437.796653] device bridge_slave_1 left promiscuous mode [ 437.802266] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.845789] device bridge_slave_0 left promiscuous mode [ 437.851254] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.940676] team0 (unregistering): Port device team_slave_1 removed [ 437.949484] team0 (unregistering): Port device team_slave_0 removed [ 437.958912] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 438.027794] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 438.089404] bond0 (unregistering): Released all slaves [ 438.733508] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.748586] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.757451] device bridge_slave_0 entered promiscuous mode [ 438.774224] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.786684] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.806344] device bridge_slave_0 entered promiscuous mode [ 438.822447] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.835420] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.842608] device bridge_slave_0 entered promiscuous mode [ 438.858242] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.864620] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.879144] device bridge_slave_1 entered promiscuous mode [ 438.888204] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.894634] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.906251] device bridge_slave_1 entered promiscuous mode [ 438.924805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 438.953540] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.961400] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.968691] device bridge_slave_1 entered promiscuous mode [ 439.001510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 439.017995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 439.039226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 439.107191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 439.135340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 439.239235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.334238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.346034] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.357483] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.400714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.420055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.431348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 439.441844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 439.477602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 439.484435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 439.503426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 439.525724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 439.542007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 439.548922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 439.752769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.759973] team0: Port device team_slave_0 added [ 439.777848] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.785130] team0: Port device team_slave_0 added [ 439.816022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.823300] team0: Port device team_slave_1 added [ 439.832216] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.840264] team0: Port device team_slave_0 added [ 439.848079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.865678] team0: Port device team_slave_1 added [ 439.875931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.883530] team0: Port device team_slave_1 added [ 439.903787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 439.922731] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 439.940378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 439.956208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 439.994074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.009195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.018395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 440.026533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.034391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.058665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 440.066912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 440.074012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.088323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.105991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.118274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.128575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 440.135937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 440.143019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.157051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.165147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.173162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.183382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 440.196049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.204664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.666317] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.672749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.679448] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.685846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.694692] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 440.809247] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.815656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.822284] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.828687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.835746] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 440.904370] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.910803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.917463] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.923851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.931341] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 441.235380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 441.242574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 441.250921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 442.900053] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.966637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.065435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.145542] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 443.154067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 443.246385] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 443.353184] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 443.362600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.372903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.384244] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 443.393418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.402025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.464277] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 443.470919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.479515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.586098] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.623900] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.667649] 8021q: adding VLAN 0 to HW filter on device team0 17:38:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfo\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 444.873739] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 444.888107] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 444.906493] Error parsing options; rc = [-22] [ 444.926723] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 444.956021] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:11 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x640}}, 0x0) 17:38:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() syz_open_procfs(0x0, &(0x7f0000000280)='net/xfrm_stat\x00') r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x3}) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0x1, 0x4) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x5, 0x8000) r2 = accept4(r0, 0x0, &(0x7f0000000240), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x9, "bbe32a86655ec8e32d"}, &(0x7f00000005c0)=0x11) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e23, 0x7, @mcast1}}}, &(0x7f00000006c0)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000700)={r3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x1ff, @loopback}}, 0xa32, 0x0, 0x0, 0x0, 0x32}}, &(0x7f00000007c0)=0xb0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n') 17:38:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xcd1, 0x220480) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000140)=""/3) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$lock(r3, 0xf, &(0x7f0000013000)) close(r3) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000002000)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 17:38:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf+\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 444.979358] Error parsing options; rc = [-22] 17:38:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf-\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 445.092281] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:11 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488d") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:11 executing program 5: r0 = socket(0xa, 0x3, 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x8504, 0x0) r2 = getpgrp(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) perf_event_open(&(0x7f0000000200)={0x2, 0x40, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000000)={"62726964676530003f01c3ffffff00"}) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/170, 0xaa}], 0x1, &(0x7f0000000280)=""/221, 0xdd, 0xffffffff}, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000003c0)={0x7, 0x6c0, 0x4, 0x0, 0x200, 0x3}) [ 445.150180] sctp: [Deprecated]: syz-executor0 (pid 30160) Use of int in max_burst socket option deprecated. [ 445.150180] Use struct sctp_assoc_value instead [ 445.181097] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfd\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xa74}}, 0x0) [ 445.221382] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 445.256740] Error parsing options; rc = [-22] 17:38:11 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf\n\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 445.325488] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 445.355464] Error parsing options; rc = [-22] [ 445.416301] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 445.442223] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 445.460284] Error parsing options; rc = [-22] [ 445.461427] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 445.476290] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 445.490361] Error parsing options; rc = [-22] 17:38:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync() syz_open_procfs(0x0, &(0x7f0000000280)='net/xfrm_stat\x00') r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x3}) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0x1, 0x4) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x5, 0x8000) r2 = accept4(r0, 0x0, &(0x7f0000000240), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x9, "bbe32a86655ec8e32d"}, &(0x7f00000005c0)=0x11) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e23, 0x7, @mcast1}}}, &(0x7f00000006c0)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000700)={r3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x1ff, @loopback}}, 0xa32, 0x0, 0x0, 0x0, 0x32}}, &(0x7f00000007c0)=0xb0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n') 17:38:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488d") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xc0}}, 0x0) 17:38:12 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x80000000000045, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) getrandom(&(0x7f00000001c0)=""/129, 0x81, 0x2) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) fcntl$setlease(r0, 0x400, 0x2) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x8402) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x2000}) fcntl$setsig(r2, 0xa, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) sendmsg$netlink(r0, &(0x7f0000000580)={&(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="d0000000150021042abd7000ffdbdf25c000660094d2058478f54703befb6adef4014522ff3e62ffe77ca542ecf28b90724a047914a47cde6ad1ed1a524aa30ab6707a5de6e7da83993383794da5ef8017bd1b4d81ce09e53fb9710630ac209fe38bfb7acefa22fca00124b1beef0e526f28de45b805f971b647d448c6c7713c4a8956985fa218cad37629306b749018a38d6ba104f3698039d142d7be65c1467a8d9a86ea0e398306796da30a90f72b77c5f484aced8985542f8b4ceefb2e54c5a2db9b000000000000000000000000"], 0xd0}], 0x1, 0x0, 0x0, 0x800}, 0x1) 17:38:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfi\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:12 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 445.820795] sctp: [Deprecated]: syz-executor0 (pid 30164) Use of int in max_burst socket option deprecated. [ 445.820795] Use struct sctp_assoc_value instead 17:38:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf%\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488d") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 445.927395] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 445.942367] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 445.962004] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:12 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d72") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 445.987189] sctp: [Deprecated]: syz-executor0 (pid 30242) Use of int in max_burst socket option deprecated. [ 445.987189] Use struct sctp_assoc_value instead [ 446.023305] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf*\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:12 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x80000000000045, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) getrandom(&(0x7f00000001c0)=""/129, 0x81, 0x2) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) fcntl$setlease(r0, 0x400, 0x2) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0x8402) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x2000}) fcntl$setsig(r2, 0xa, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) sendmsg$netlink(r0, &(0x7f0000000580)={&(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="d0000000150021042abd7000ffdbdf25c000660094d2058478f54703befb6adef4014522ff3e62ffe77ca542ecf28b90724a047914a47cde6ad1ed1a524aa30ab6707a5de6e7da83993383794da5ef8017bd1b4d81ce09e53fb9710630ac209fe38bfb7acefa22fca00124b1beef0e526f28de45b805f971b647d448c6c7713c4a8956985fa218cad37629306b749018a38d6ba104f3698039d142d7be65c1467a8d9a86ea0e398306796da30a90f72b77c5f484aced8985542f8b4ceefb2e54c5a2db9b000000000000000000000000"], 0xd0}], 0x1, 0x0, 0x0, 0x800}, 0x1) [ 446.068363] Error parsing options; rc = [-22] 17:38:12 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="6563727970746673ff", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 446.100736] Error parsing options; rc = [-22] 17:38:13 executing program 0: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380), 0x217, &(0x7f0000000180)}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x217}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x0) getgroups(0x4, &(0x7f00000000c0)=[0x0, 0xee00, 0xee00, 0x0]) getgroups(0x1, &(0x7f0000000100)=[0xffffffffffffffff]) setregid(r2, r3) 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d72") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xca8}}, 0x0) 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptf0\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:13 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfc\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 446.742984] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d72") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:13 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfp\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 446.799401] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 446.825779] Error parsing options; rc = [-22] 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d7260") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 446.904834] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x40c}}, 0x0) 17:38:13 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000140)) keyctl$session_to_parent(0x12) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10042, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000080)) ptrace(0x10, r0) ptrace$getenv(0x420a, r0, 0x8, &(0x7f00000001c0)) 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfX\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000002) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x1) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x23, 0x400, 0x8}, 0x4}}, 0x18) close(r1) 17:38:13 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup2(r1, r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', r2}, 0x8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000100)={0xf000, 0x4000}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_netdev_private(r4, 0x89f9, &(0x7f0000000440)="0fab6cd97b49f5026b5c455bbd9db33a70c39c0219d9dd5b60050411a570f3412f61313a153ae791c92efe4d208a6b343983d4625b8def95535de4673ee57b6b5624e214179dc357f91c3a2853f3420fa5a20fac0859e272ec93a29143b4db88e09fb662378f57b61bf333917faa7fa2f9af3dd822a039d0863c7426d28048229427381cfd4d2e8a8e9bd5c9216aff1409571573f8e9b622fc42ecc7209cf607f5422f5640d985b52895512948e604c346eab56b2c34ebef9e63813dde34e44acfa7f21600c6e710624a43c90ed7bde408ec9bd993362e51dcecf3a261ec8ae046c37b83668e35aa129e21cd730c8b6038f596524f634c08a4e67408f870e49cdf2aa083d1a61f907a78fb76cf195678d82b8fd2229679ed01a5c1caff59fbd2ff95ae7ef4c384fca8182c5928bd635d488da7b9e98c5b4f199e80ced57d66b89d6f546cc0154fd40ba4667dadc96de895754274efcbad523eb07eedc8a457e70af75804d5865903e9a7efd327fcfaa74d8690dd18ef28aee0f98f9e6d2e0893fb3c737225023a091824841fe77ae67ee46f6c429e5d3e440a367c9ff575b2eb73cb854408fc7c72c3aeaf8a789e366d543a261281607ae54d871a03dc416340f8d73c4620f78799a1708ad5a94523d1c87af9351bca7e26a8b523d7ed3345f97fe570e9dd7acd05cb4dab591d09440b80391d7ef4873c847416306c22792a2f89b8310894db92f95bea126be71c4166d22cdef54497c71c8bb7d34aad16913616876919961ee015bc14536d0bc3c101d3b3c589dc4d5fc9d1e117b06df608117f4c423d5abdd402bfa4c3adf05863ddabd39486874f5cd4c1550f9446907b7d94024ebebee5ce18ae840c3c8a7bdfc7aaa7f972deb3e1b908edb895431a3d29087ec1a5170081f2ddde47af28d8624217cf9fceff15978e66fc8bc20562e53ca2c68383e062b43861445fcf923885588d82788d9deb6f68056540f23f5426170c0a9d5da2d91695d981189aae5be45df035b05ee759c70dd616975c56f168b8f80197f6824a540dc27e7e4442ec474f51945968d2949dca47b715ccf61311394daf905e587a3d6519c63f7853263c71193e245e3d7fca305ddd28f1a0cc66100dc543dfbb2ca82966cf81e1216bfb9922b160fc4fc470bc01afb6b55996a307c44f372c1711f77268f3ae8bbdf8574107159e92a1a6c678e833adbc1ed5f543074b56662da7dfd64dbdcbdead9d0953a823d4715437d2cfbd704e0b95854ede5c5825ee3563af8ad23547e052a67885b6b038aa32724f9a905eac1d2d8f9100b26c3c5fe44feaa232cd7a388c734b7ab2e43b734e8db4f3e9e0322774e91f904fe5874d13f7ee5910f43867ee39fb739e9ce7b54ccb87f68f681f85c9b7eedf9963a7d6612263df325b357ed73c704d2765443554c18e5e443e1e74baf5d7ba1ad6d862654f066079f6428d6a2c81657474c211bed25f8bec34c91bbab666354855854555c5196ca1e8b2d137c49d2e8b07fa5ea93a5351de89a76e1567647a7f929a3e771dc93b0aad09d4be9ea12441e2cd2bb354966b889860d004e728e0fa391e336d33a02162fb9f94d85f3bc76fe5409bfdf5c36b8e210778f43ed31fda123d6a8f344c8fe411dd5acf5786219122e1013b952d816ceae5b5d65bb8f7d1f9ee936806740f3e540b9c75906c3cd346f3c4ae4023abf74161c0c907f1df7d01a3f9581ca66377f51cbca353b1ca3749576600f5b1f746c98a7c812b6304f25f42feb6cebd65d4d717475e2bf906af3932a7ebf8b0cadcbd1e3be0bc791214aae8249808f9f0a3a30eb1ac3f4d643d9264764dd5b80bc6b9e881e191448d7011d264ead568380c05cf78779f14566af9b46c9f1dd3f082384509c39f7c963022fe7da8fe4716d05dcee95a5cb6b60ed8fb6dd214e810f31f79ffe8d0d8efd3d14025a5f1b9b031c810b3f64158411e1e975bb23864fdfe8aec40613e70498db3c4fcc8a51e293b0f0229e3f0d8f5d13b0e8d2efff14d3f9ac637f0735e4b71c94ef912320895751a75a2ae2d9cc00c708c8f392f7e5c42ec1029726bd373872aac216b8e177169c31f0f5dd25b99035272f8302bec64d3c601b242f1320e225c378dc9b080832c8ea9dc23f9b01ab52b0a747005684dc381f445d7f02bab72ec9816f6d59be29757f5aaae2c372bf74f1d36b24dfce3d0d5cb829acccf9d4ac5e0786d3c2ec800ff20d7bbdd05e22a57c71f2f72cbf7a02b8b982f657faeba12cf158f03fc054bb8b61c4533eda3fb7458523e375c8c54eed188de3216d18de63a61bcd875620735ade42c69354c6495e2fff8057ca5e5fbe4cb6a5d76a197a364ed21cca405e5b15c2304fe6dfb5087126e361bf7fcb2e27d1790486a57886c7986abf83bfbfb486f85d59297a02d3ff4024da99e912dd5eb798ad60e96f92aa3fac3da50e158e280e989ad334359c8c6aa162ef9a692703b144e31f235ac40bd022d7dbbd075b121d009c913c430045d7223f631ec6e12438037dcf08213a3be737be514a7a2cf1e6ad5432cfff265b047571a819323f917beb29f0bb42c9a48765358b174d9ed916fd64c9607e6a12be16e1f3375918a7ba2021ee1f8426d567dededd7a0ceb873e9c4296b2fe7edbabb0e3fcdd9c269f397d8bf45014de399f05a3828ff30639f7ec82c975464f25d883675e43b1cf0b68e7670f7a65e36faccd4603d88aab4745b6a7eb4e19b4b10030af4bc263d2aba1fc380949e1d4e05bb6c7e31c75a80ccd87446ff783084d94c9b93092e1a74485755ae816b716e649af30659d0593e88e2bbe2182cb59186563227d84f6c4423e128f9f7c0f61ec48e50345734b6959a1f042627c471bbcdec021ecbfa6b3be811446814858d7ffd70a52b8ca607e3b5f2aed49cfdf2a033f8a2f9425793b3f990d5a9b7b4299f861bd66f8bea56430875910d390f079f9278a13fbd843ada9fd461085ab9631d2ff591eea260033b679f9cb33896244ce2c783563b9b22c3fd4bd9efd5de1b8004b190a9226530b814a2c310eb3c506b1a4b3d571bf8d5fbe63a4a98c9e119446acbc5653ee53a3dc8716b7b5322fd25552a3fa057deb4354da3c1e92c6ef36a619f0607fa08dff4470052b1238f1275a143f2c90a86b52b09ab0a8b188c5f6be6962410f61063c75875c18bfbe501546d5c9f6fac3ecb3e09f2403184afd0197fa722d62dbd01c86827e095f44847098cfbaa47310a1734ad2a686e7eaf30ea4179e43d19c643dac1bea3db0841c481814a1a43bcb97cf35d40c8bc6a9627959af6d2f3da9a3a149c823e08ec107def4a9c49cf151e5b925757a68343e54fc4a1bff55d1032365baba89d75cd8bbec19052ebc3db107347bc9e7b8d364c3ae3bf5dac97fddd6a402dd38f06eec743cbc75bcb123c465f4777c641cfc518d798e16da4eecbf4e5676bbc86e09faf834426d8eaf9dacf6fb6dfca8f4d74958f54a3431716412697281f11cd2d18135cad266fdfd4e0bc72d28b20c098b27173ac66fc7c1ac83bea54a9d2d7a1df7c7fbdf41d0c094c12011a56cee6b831591bfb2142bdddf857f33f997371f4121ffbe01c8a9cdffd6be8bce72ca8753312964dc4f979dc0f8b8be30c217167e7ae340a36dd0ced6c343a8b32166d25477aaf291c7451731316f804d61822e0e91f28aeebcc1eaa4246df5df6c57b35c8e32f417e9ad0a004ccb3f5b15c7dcd48b4a01db0a3dec1577b6e1e6def10b2fa5a0abb32357d786ae2f4293a6a72178a28ec6ddc6257efef919063d0037c46ba1867cae69ecb57fd938968bd08d37bdeccb76a1183ad627306cf853bccc5e19a03cdb239b7c78d59de0bd7557b7ec8e498e2711b269952b163e99574f901a20b3394605eb719013a107586754e30abd402dc8df8a35398139e37d08ff46aa183f8c1e988b9824aee874fc98bc24a39db2f7f712660e215bcad8d40e35b5d9d63068a5c80239196e7dc5f30bd3addcc0446873791b7c28463c4b7948e17ac89f447191aa15bee03fecffc9301f3a2680a48ce1d86bbe3fdb2df5401f7164aa790b939a7560ea24b68440f4785d75a6f7d10ecbb3d28e202ab1b00601f1acbfb7d789ee29694e0f8879a562fdd11cb19f4bedc8b064c793a31e6d651690227ddaeb2be8763ae55328a29a52de50e0c68573708b1662f6de0755825e1bf648c17602d91582a07e0be95a9627b2ed941926d58c45d05257aa29dcd26c775d109b5151f7ca2cfc8bd97301ba417680300ef6a4efe5cbb2ac956479958ec4cb61df6c3ac9bbdfb9c921e8df905a28c15d50a51063de7c272b25d1a5e3e2e941b0fbfcf6a8322b43e76243b53d6ac52b08875b1bfb4b0cc5ff8725359afea507dd28f3d77f2ed340dd28bbf4d19606765b98b0673040d38ad643a1500e95362e7acd3c12644ef5f4399dc54a51fee75680a5cc68b9a5631f2eda0b65100f6742d4c8e82145eb0b5b604f18d36ff0c819181b2a9b283d5bfa3824c2cc22688464a361293a4e7f8ff57bf8d502aeaac6a8ce310fcd660aa538159977869869cf26044d54b8679864c37d072ac294dd73d3c31d4cb014b41fc08c8373903c8cf6b3f8b3bec7714f693839de58591f66032e8e893dd028c580426b7ac28c17f741be54aba08d119e5fa8682c6e9d10216f52031fcc27b16ac41a8ff05255c7f406e51f76f0d1eb9769f8aff0c3b253594aa13e4f457b2dc9e484e91288725e94aa6535293a9451f1367e6613283c8e024398029a7921a05ea9187a5e529f61da855d1073c83c75d8dc6baf753c264ca7515ad21870340986a4f41585589e1e50349d3066d6251e81b79c388d57c1681bd3151f950d5094cef67773b67b644cb8d242d1b76f9c3cc2430ada6801c2955277ce8b3415b61c16db4e355716ca42ce2c2b43373ca367db6b8f6cdc2db88b10b734dd0c2e53842b6af2f397b8ead896df10838af4d6ae3e1d6dd004fd29033a6e036587ffac8031b430cbdcfcb5be360635ac597469c89f007595841d6ceee6483274ea1f2108380146767f81f0fb2c17a8138922a53d440b4216794af87d7ad1ab0e364c8d17cbe9c1a2c9dd962edab65b4c8f913d455ab6605e5c1442b3d524da643bde2a8a1db3d313da8ccdcb52ddb5776ed532dd8008724a633df2f99a9be2adb5842c1af1fff791711b200935e91256cf1f286624da9c66694a85f8e38b3d149b72d1601b47b7235dc2f2c00d13b03e137c8c7f780fc3902fbb5cfa532f3ddb921eafed105d295e8bb80067cb80e29bc74679f5120b14dbfa9178c92a14acd10faff648cafa9a6968414dc7e2539bfdc52d644e8f76db321c7b28db90bff73bbe261d03fa285582a2d11f8187af11749ec23e2c1037303990df9b6084eec476bc26da746dc7260f1d1ab5d6be1c5c8fc9a286c96d0b7e5da14216ce6f0feac5603937595d0497c59a198785642eca5ecd0dcdcc80f4139ffb22fd0c21f944d47a6fba02c59d21eb20e82c3a0583798614b8ffb8d9b61c0f7277acef2aa4e0d5339686ada19a9862acb8f5e6f08fbb599e876fb374eaaff855337e7943e72751ac4a3ce25aa9b3aefedba91a9358b0665f2fd4c29699bdca4b8a50f50395264ab7351ceb28908a21f2cf2d277fa03fa193de9478b98bfc9e9aa204b7b926530b0bfb5000aa16209a2488bfd8fdc75513b734be77f0572327b139a969ab0763210b15c23334f6fa91bd70c7d1ade381ae9b5a52ef470502bd9465667209562a458a44ee55075e6c87406b22598cb0220bb35f8eb") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fda000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000200)="c4c255961eb805000000b9002000000f01d966b841008ed866baf80cb89da1d281ef66bafc0cecdc070f20c035000000800f22c0b8010000000f01c1440f20c0350c000000440f22c066b828000f00d0c4c10158db", 0x55}], 0x1, 0x8, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 446.963284] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 446.985467] Error parsing options; rc = [-22] 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d7260") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfx\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 447.073859] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.119305] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.140723] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.148792] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d7260") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:13 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 447.156046] Error parsing options; rc = [-22] 17:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x7c8}}, 0x0) 17:38:13 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:13 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 447.262488] Error parsing options; rc = [-22] [ 447.298779] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.338269] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.350757] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.362173] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.367762] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.387583] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.397948] Error parsing options; rc = [-22] [ 447.405039] Error parsing options; rc = [-22] [ 447.418699] Error parsing options; rc = [-22] 17:38:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000002c0)) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e20, @local}}, 0x0, 0x101, 0x0, "32c606751cfe01f4b7440fc8184d01c5ae2aa62403a9f207b31480f58b402c063b05793eb1619ea2e741bf56b6be2f0e3cf5f2efe22bacd4ecc8323e6677a27e3a3374bb72c95747289619a26dcd51cd"}, 0xd8) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000000c0)={0x3f, 0x20, 0xfd0}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000140)="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") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1ef, 0x0, &(0x7f00000000c0), 0x132d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x11, &(0x7f0000000080)=[@dstype3], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:38:14 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d7260") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:14 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x980}}, 0x0) 17:38:14 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 447.876136] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.877170] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.887930] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.907497] *** Guest State *** [ 447.912397] CR0: actual=0x0000000080000031, shadow=0x00000000e0000011, gh_mask=fffffffffffffff7 17:38:14 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:14 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f00007f7000/0x1000)=nil, 0x1000, 0x0, 0x58831, r0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 447.922104] CR4: actual=0x0000000000002050, shadow=0x0000000000000010, gh_mask=ffffffffffffe871 [ 447.941838] Error parsing options; rc = [-22] [ 447.944126] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 447.964614] CR3 = 0x0000000000004000 17:38:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xe58}}, 0x0) [ 447.974577] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 447.987456] RSP = 0x0000000000000f80 RIP = 0x000000000000001f [ 447.997946] Error parsing options; rc = [-22] [ 448.003019] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 448.013502] RFLAGS=0x00000002 DR7 = 0x0000000000000400 17:38:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:14 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs`', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 448.025355] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 448.044051] CS: sel=0x0023, attr=0x000fb, limit=0x0000ffff, base=0x0000000000000000 [ 448.058217] Error parsing options; rc = [-22] [ 448.065415] DS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 17:38:14 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x0, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 448.098503] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 448.153937] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 448.169533] SS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.185374] Error parsing options; rc = [-22] [ 448.193371] ES: sel=0x002b, attr=0x000f1, limit=0x0000ffff, base=0x0000000000000000 [ 448.201654] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 448.213908] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 448.226838] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.244166] Error parsing options; rc = [-22] [ 448.249560] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.257728] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 448.266779] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 448.274805] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 448.274828] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 448.291061] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 448.297526] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 448.304993] Interruptibility = 00000000 ActivityState = 00000000 [ 448.311294] *** Host State *** [ 448.314520] RIP = 0xffffffff81212b2e RSP = 0xffff8801c19af350 [ 448.320550] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 448.326993] FSBase=00007f6ec0aa1700 GSBase=ffff8801dae00000 TRBase=fffffe0000034000 [ 448.334773] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 448.341184] CR0=0000000080050033 CR3=00000001c030e000 CR4=00000000001426f0 [ 448.348248] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87c013a0 [ 448.354942] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 448.361216] *** Control State *** [ 448.364677] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 448.371390] EntryControls=0000d1ff ExitControls=002fefff [ 448.376897] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 448.383824] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 448.390532] VMExit: intr_info=00000000 errcode=00000000 ilen=00000007 [ 448.397174] reason=80000021 qualification=0000000000000000 [ 448.403491] IDTVectoring: info=00000000 errcode=00000000 [ 448.408961] TSC Offset = 0xffffff0dd5f89bab [ 448.413317] EPT pointer = 0x00000001c13c301e [ 448.465428] *** Guest State *** [ 448.468816] CR0: actual=0x0000000080000031, shadow=0x00000000e0000011, gh_mask=fffffffffffffff7 [ 448.477846] CR4: actual=0x0000000000002050, shadow=0x0000000000000010, gh_mask=ffffffffffffe871 [ 448.486853] CR3 = 0x0000000000004000 [ 448.490597] RSP = 0x0000000000000f80 RIP = 0x000000000000001f [ 448.490611] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 448.490638] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 448.509498] CS: sel=0x0023, attr=0x000fb, limit=0x0000ffff, base=0x0000000000000000 [ 448.517536] DS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.525585] SS: sel=0x002b, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.533563] ES: sel=0x002b, attr=0x000f1, limit=0x0000ffff, base=0x0000000000000000 [ 448.541573] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.549585] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 448.557661] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 448.565684] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 448.573653] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 448.581897] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 448.589948] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 448.596395] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 448.603829] Interruptibility = 00000000 ActivityState = 00000000 [ 448.610076] *** Host State *** [ 448.613269] RIP = 0xffffffff81212b2e RSP = 0xffff8801c1187350 [ 448.619309] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 448.625782] FSBase=00007f6ec0a80700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 448.633578] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 448.639488] CR0=0000000080050033 CR3=00000001c030e000 CR4=00000000001426f0 [ 448.646551] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c013a0 [ 448.653215] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 448.659384] *** Control State *** 17:38:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x1d, 0x1, 0x0, 0x0, {0x2}, [@nested={0x8, 0x3, [@generic='!']}]}, 0x1c}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, 0x2c, 0x100, 0x70bd27, 0x25dfdbfd, {0x8}, [@typed={0x8, 0x7, @u32=0x40}, @nested={0x20, 0x6f, [@typed={0x8, 0x8b, @u32=0x8}, @typed={0xc, 0x49, @u64=0x9}, @typed={0x8, 0x4c, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}]}, @generic="22d1f967aeb5e3f7d85ce1f0bbcffbb3b10a99c9ba564d2d90926808ed00d87a7f36cae143eede77beacac5f7026fe81379d5800ae09f62f90b284d17dc919e403b0f0bd1e42bbcc494f56c0f7101cf124c427566bbffcc8a901f23f07ff5ea51b70"]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x4014) 17:38:15 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40000, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0xab, 0x4, 0x8d78, 0x2, 0x9, 0x7, "b3a90db7d121a345184db368c89e4ba8193543aebe08688a4d9cfb77a70eab3f9b68d5b45869d97954a42f8972a4d0a6b2af0ebbf23bd3b37733c60638e75a4dd31f2ebe1f19c0449f0601c3a6728c9345c7e398131aba9a859a07a46ac437aad881a29e0be86126ba6390f920b914f57bb6d94ab419bc73ae19dcc3d876de244a46104ec33148c95be26b0eb50c038016611c6de51c523588610294a5fc0ae64852edec7d2062c0f2e233"}, 0x1c3) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x24800, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0xffff, 0x2f4) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000440)) r3 = getpid() ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000100)=0x9) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000002640)=@hci, 0x80, &(0x7f0000002b80), 0x0, &(0x7f0000002c00)=""/11, 0xb}}], 0x1, 0x40000003, &(0x7f0000002d40)={0x77359400}) 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x0, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xc70}}, 0x0) 17:38:15 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 448.662853] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 448.669536] EntryControls=0000d1ff ExitControls=002fefff [ 448.675047] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 448.681996] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 448.688686] VMExit: intr_info=00000000 errcode=00000000 ilen=00000007 [ 448.695304] reason=80000021 qualification=0000000000000000 [ 448.701638] IDTVectoring: info=00000000 errcode=00000000 [ 448.707114] TSC Offset = 0xffffff0dd5f89bab [ 448.711436] EPT pointer = 0x00000001c13c301e [ 448.770018] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 448.795617] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 448.807827] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:15 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/kvm\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x7, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendto$inet(r0, &(0x7f0000000640), 0x0, 0x20000004, &(0x7f0000000740)={0x2, 0x4e20, @rand_addr}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) pipe2(&(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae13, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000380)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={0x0, r5}, 0x14) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$inet6_dccp_buf(r5, 0x21, 0xd, &(0x7f0000000200)=""/87, &(0x7f0000000280)=0x57) remap_file_pages(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x2000000, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000600)=0x14) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000340)={0x4}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), &(0x7f0000000180)=0x8) [ 448.818363] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 448.838987] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000000c0)={0x40000, 0x7, 0x1, 'queue0\x00', 0x6e}) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc4c85513, &(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0, "86195c5f6d862e013a2f76442ee8b753ffe838973c28fddca83501e3463516037660c46107d1ab965d3aa901"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "260a799355392df37b409772ec0b18ad45f8393ae38dfa72eb8a4c6cb6de26c4c869de5ed38f81dbb4b0b77d9c52f5836999c6f111f4769edd21d83716cbf3be", &(0x7f00000001c0), 0x7}) 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x0, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xbb4}}, 0x0) [ 448.865707] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 448.890701] Error parsing options; rc = [-22] 17:38:15 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 448.911877] Error parsing options; rc = [-22] [ 448.929277] Error parsing options; rc = [-22] 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 448.984397] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 448.999998] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:15 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffffffffffc0, 0x800) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x4, 0x2}, 0x10) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400102, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000140), 0x8) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000040)={0x2, 0x6, 0xfffffffffffffff7}) 17:38:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:15 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/kvm\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x7, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendto$inet(r0, &(0x7f0000000640), 0x0, 0x20000004, &(0x7f0000000740)={0x2, 0x4e20, @rand_addr}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) pipe2(&(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae13, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000380)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={0x0, r5}, 0x14) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$inet6_dccp_buf(r5, 0x21, 0xd, &(0x7f0000000200)=""/87, &(0x7f0000000280)=0x57) remap_file_pages(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x2000000, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000600)=0x14) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000340)={0x4}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100), &(0x7f0000000180)=0x8) [ 449.037829] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xea4}}, 0x0) 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 449.105310] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.139579] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.152944] Error parsing options; rc = [-22] [ 449.161917] Error parsing options; rc = [-22] 17:38:15 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffffffffffc0, 0x800) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x4, 0x2}, 0x10) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400102, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000140), 0x8) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000040)={0x2, 0x6, 0xfffffffffffffff7}) 17:38:15 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 449.209573] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="6563727970746673ff", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 449.266157] Error parsing options; rc = [-22] 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:15 executing program 0: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffffffffffc0, 0x800) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, r1, 0x4, 0x2}, 0x10) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x80) r2 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400102, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000140), 0x8) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000040)={0x2, 0x6, 0xfffffffffffffff7}) [ 449.291873] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.324177] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) sched_getscheduler(r1) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000280)=0x100000001) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x7, 0x401, 0x8, 0x3553800000, 0x7f}) r3 = socket(0xa, 0x3, 0x8) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x40000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f00000002c0)={0x2000, 0x2000, 0x5, 0x2, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r4, 0x3, 0x3}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in, @in6=@mcast1, 0x4e22, 0x0, 0x4e21, 0x40, 0x0, 0x80, 0x0, 0xff}, {0xb4, 0xffffffff, 0x7, 0x31, 0x6, 0x400, 0x100}, {0x0, 0x0, 0x7}, 0x5, 0x6e6bb5, 0x1, 0x0, 0x2}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0x0, @in6=@remote, 0x3501, 0x3, 0x1, 0x2, 0x0, 0x0, 0x20}}, 0xe8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000300), 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) sched_rr_get_interval(r1, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100), 0xffffffffffffffe8) setsockopt$sock_int(r5, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000500)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000540)={r6, 0x1}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr=0x5}, 0xc) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000140)) shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) setsockopt$inet_buf(r0, 0x0, 0x23, &(0x7f00000001c0)="8cf1910261fcb72a1cac43befcc406072738c9d77df7ab377b106119eab93998a5dbdd1305fe080065259e97714cf714f880835fb0c811930df427cc304a7df4caab24b18e2ad22b6531b8eff4f437f13d4613e2af1acac2c533303ac37c80095cd4d5b3652d30a02509d5ab0b2bb196105a04d10f7e6a853c5d1da5fced3310cfae1c0334c2c1cccd61fca600", 0x2ff) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000400)=""/87) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000040)=""/97) 17:38:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x828}}, 0x0) [ 449.344439] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.425682] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.437304] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.455301] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.466367] bridge0: port 2(bridge_slave_1) entered disabled state 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 449.473037] bridge0: port 1(bridge_slave_0) entered disabled state 17:38:15 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f00000002c0)=0x4) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r1, 0x9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff87, 0x4c}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x5, 0x240, &(0x7f0000000000)=""/195}, 0x48) 17:38:15 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:15 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 449.506053] Error parsing options; rc = [-22] [ 449.511997] Error parsing options; rc = [-22] [ 449.521817] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 17:38:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f00000000c0)=""/1, 0x1) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000180)="1e69079d1fcd4544dfa8b4a6687f2e19d0c83383bcbe2919e1643c291b153d93873441b87356674f268183775ff2cde338e225e9469f855ef416c57425f8aa4a8ebb3dd7bfe37e71e0243d548a49d6368e1efa173397e05f9ebe812cc824ee5df8067709ec6cef", &(0x7f0000000240)="a1c9917465bfcb3e53e0a9362ccff33012d96190f6140a7d89dbb1cbcd68554b57052082bc120950e828f5e1371739e457f1ff2dbeecf77369e88cd050c1492b8f0d5c4ba5dc1b50105c8df40ef8bc66848b5e6de475668b5aa8a7fa221f54d2935b312dbd83ca20cb6c8c8eba4fd61d56801224e60d01a932a9b19717be65d0fa3d3c11b33e1502b348cbbdfa35193c503e87369829899444dfe69e78411e15e130081e361e2e25a2eef76ca165739dc7cd67ac1f341a936ea60f5004f0fc7a7757e3b59ad79b2b9f05ef1d2fe8f1c58d"}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000540)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)) tkill(r3, 0x1000000000016) 17:38:15 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="65637279707466738c", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 449.572112] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.608084] Error parsing options; rc = [-22] [ 449.612826] Error parsing options; rc = [-22] [ 449.633504] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.657936] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.658069] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 449.664710] bridge0: port 2(bridge_slave_1) entered forwarding state 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 449.682708] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.689649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.712914] device bridge0 entered promiscuous mode 17:38:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797074667303", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0xd64}}, 0x0) [ 449.734825] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 449.736746] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.750373] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 449.800815] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.808870] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.831900] Error parsing options; rc = [-22] [ 449.857048] Error parsing options; rc = [-22] [ 449.880113] device bridge0 left promiscuous mode 17:38:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), 0x4) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') geteuid() getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffff9c, 0x0, 0x482, &(0x7f0000000040)=""/205, &(0x7f0000000140)=0xcd) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x5, 0xc6, 0x9, 0x80}, {0xfffffffffffffff8, 0x9, 0x20, 0x8}]}, 0x10) 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797074667306", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 0: futex(&(0x7f0000000040), 0x400000085, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0x2, 0xffffffffbfff7ffe) clock_gettime(0xfffffffffffffffd, &(0x7f0000000200)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) rt_sigqueueinfo(r0, 0x4, &(0x7f0000000180)={0x3b, 0xdfc1, 0x4, 0x1}) 17:38:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="656372797074667304", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0xffffff1f}, 0x0) [ 449.938872] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.945319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.952019] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.958445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.965972] device bridge0 entered promiscuous mode [ 449.971693] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 17:38:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 450.014063] futex_wake_op: syz-executor0 tries to shift op by -9; fix this program 17:38:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x300}, 0x0) 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 450.104933] futex_wake_op: syz-executor0 tries to shift op by -9; fix this program [ 450.119973] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:16 executing program 5: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xfffffffffffffea3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r3 = dup2(r1, r0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000680)=0x400) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000000169dcda29d7ae2dd8cb98c2405b201000001000100000000000400000038f958c99b6d79895600000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], @ANYBLOB="000000000000000002f0000000000000cd00000000000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000dae5180000000000000000000000000000000000000000000000000000a4b66c0f84abaf6730910c6f4b0000000000000000000000000000000000000000000000000000000000001d9f000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000f9fd9e05cbf8a7090000020000"], @ANYBLOB="0000000003000000"]) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000180)) read(r2, &(0x7f0000009f9c)=""/100, 0x64) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x36, r1, &(0x7f0000000040)="0d730ba5b8c25c28823d395f1dbe90d19da95df704696d77f96e34ce0d1821b5e500e22e347a075928c513b279e71deb05f7dc23b7ee35f2d151edb9a9ec61c6dd484f8870fda6bc6fd3fa143a0dac7bd829ebb0b9b9514b7899d71f8fc89b847f351ba29afef54c431ffebb", 0x6c, 0x3, 0x0, 0x1, r4}, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x10, 0x1, 0x6, 0x2, 0x8, r4, 0x401}, 0x2c) ioctl$LOOP_SET_DIRECT_IO(r1, 0x1277, 0x930000) bind$bt_rfcomm(r4, &(0x7f0000000500)={0x1f, {0x6, 0x101, 0x1, 0x4, 0x40}, 0x1}, 0xa) [ 450.165811] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 450.183302] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.197319] Error parsing options; rc = [-22] 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfffffffffffffff7}) read(r1, &(0x7f0000000140)=""/19, 0x13) [ 450.241520] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.275542] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000140), 0x1c) r2 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r2, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8, 0x0) 17:38:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x2}, 0x0) [ 450.296750] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.312081] Error parsing options; rc = [-22] [ 450.331492] Error parsing options; rc = [-22] [ 450.409853] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) [ 450.466544] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.481103] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 450.492905] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.507453] Error parsing options; rc = [-22] [ 450.512476] Error parsing options; rc = [-22] 17:38:16 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x8}, 0x0) [ 450.545383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 17:38:16 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 17:38:17 executing program 5: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xfffffffffffffea3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r3 = dup2(r1, r0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000680)=0x400) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000000169dcda29d7ae2dd8cb98c2405b201000001000100000000000400000038f958c99b6d79895600000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], @ANYBLOB="000000000000000002f0000000000000cd00000000000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000dae5180000000000000000000000000000000000000000000000000000a4b66c0f84abaf6730910c6f4b0000000000000000000000000000000000000000000000000000000000001d9f000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000f9fd9e05cbf8a7090000020000"], @ANYBLOB="0000000003000000"]) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000180)) read(r2, &(0x7f0000009f9c)=""/100, 0x64) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x36, r1, &(0x7f0000000040)="0d730ba5b8c25c28823d395f1dbe90d19da95df704696d77f96e34ce0d1821b5e500e22e347a075928c513b279e71deb05f7dc23b7ee35f2d151edb9a9ec61c6dd484f8870fda6bc6fd3fa143a0dac7bd829ebb0b9b9514b7899d71f8fc89b847f351ba29afef54c431ffebb", 0x6c, 0x3, 0x0, 0x1, r4}, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x10, 0x1, 0x6, 0x2, 0x8, r4, 0x401}, 0x2c) ioctl$LOOP_SET_DIRECT_IO(r1, 0x1277, 0x930000) bind$bt_rfcomm(r4, &(0x7f0000000500)={0x1f, {0x6, 0x101, 0x1, 0x4, 0x40}, 0x1}, 0xa) 17:38:17 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 450.666328] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 450.730138] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.748911] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 450.761229] Error parsing options; rc = [-22] [ 450.773121] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.784866] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 450.787646] Error parsing options; rc = [-22] [ 450.801093] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.831297] Error parsing options; rc = [-22] 17:38:17 executing program 0: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xfffffffffffffea3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000004c0)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r3 = dup2(r1, r0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000680)=0x400) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000000169dcda29d7ae2dd8cb98c2405b201000001000100000000000400000038f958c99b6d79895600000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], @ANYBLOB="000000000000000002f0000000000000cd00000000000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000dae5180000000000000000000000000000000000000000000000000000a4b66c0f84abaf6730910c6f4b0000000000000000000000000000000000000000000000000000000000001d9f000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000f9fd9e05cbf8a7090000020000"], @ANYBLOB="0000000003000000"]) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000180)) read(r2, &(0x7f0000009f9c)=""/100, 0x64) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x36, r1, &(0x7f0000000040)="0d730ba5b8c25c28823d395f1dbe90d19da95df704696d77f96e34ce0d1821b5e500e22e347a075928c513b279e71deb05f7dc23b7ee35f2d151edb9a9ec61c6dd484f8870fda6bc6fd3fa143a0dac7bd829ebb0b9b9514b7899d71f8fc89b847f351ba29afef54c431ffebb", 0x6c, 0x3, 0x0, 0x1, r4}, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x10, 0x1, 0x6, 0x2, 0x8, r4, 0x401}, 0x2c) ioctl$LOOP_SET_DIRECT_IO(r1, 0x1277, 0x930000) bind$bt_rfcomm(r4, &(0x7f0000000500)={0x1f, {0x6, 0x101, 0x1, 0x4, 0x40}, 0x1}, 0xa) 17:38:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0xb}, 0x0) 17:38:17 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 17:38:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="6563727970746673ff", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:17 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:17 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 451.169192] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 451.179458] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 451.191955] Error parsing options; rc = [-22] 17:38:17 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 17:38:17 executing program 4 (fault-call:11 fault-nth:0): pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) [ 451.300517] ecryptfs_parse_options: eCryptfs: unrecognized option [5QÍ]ãžÏésPÅ™éivn5Q]šm9:]$]Ì ¡6e¾BâÁÿ] [ 451.351549] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 451.368752] FAULT_INJECTION: forcing a failure. [ 451.368752] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 451.395534] CPU: 1 PID: 30741 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #278 [ 451.401821] Error parsing options; rc = [-22] [ 451.402924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.402931] Call Trace: [ 451.402958] dump_stack+0x1c4/0x2b4 [ 451.402983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 451.428287] should_fail.cold.4+0xa/0x17 [ 451.432398] ? mark_held_locks+0x130/0x130 [ 451.436643] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 451.441762] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 451.447576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.453151] ? check_preemption_disabled+0x48/0x200 [ 451.458185] ? debug_smp_processor_id+0x1c/0x20 [ 451.462873] ? debug_smp_processor_id+0x1c/0x20 [ 451.467561] ? zap_class+0x640/0x640 [ 451.471285] ? zap_class+0x640/0x640 [ 451.475010] ? ima_match_policy+0x848/0x1560 [ 451.479427] ? lock_downgrade+0x900/0x900 [ 451.483591] ? do_raw_spin_lock+0xc1/0x200 [ 451.487838] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 451.493642] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 451.498754] ? __wake_up_common_lock+0x1d0/0x330 [ 451.503532] __alloc_pages_nodemask+0x34b/0xde0 [ 451.508218] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 451.513247] ? arch_local_save_flags+0x40/0x40 [ 451.517857] ? mark_held_locks+0x130/0x130 [ 451.522103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.527684] ? debug_smp_processor_id+0x1c/0x20 [ 451.527699] ? perf_trace_lock+0x14d/0x7a0 [ 451.527719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.542165] ? check_preemption_disabled+0x48/0x200 [ 451.547210] ? debug_smp_processor_id+0x1c/0x20 [ 451.551918] ? perf_trace_lock+0x14d/0x7a0 [ 451.556163] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 451.561706] alloc_pages_current+0x10c/0x210 [ 451.566137] ? zap_class+0x640/0x640 [ 451.569864] skb_page_frag_refill+0x45f/0x6a0 [ 451.574377] ? sock_kzfree_s+0x60/0x60 [ 451.578274] ? mark_held_locks+0x130/0x130 [ 451.582520] ? mark_held_locks+0x130/0x130 [ 451.586772] sk_page_frag_refill+0x55/0x1f0 [ 451.591109] sk_alloc_sg+0x1e9/0xa00 [ 451.594865] ? sk_page_frag_refill+0x1f0/0x1f0 [ 451.599461] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 451.604929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.610485] ? check_preemption_disabled+0x48/0x200 [ 451.615521] ? lock_sock_nested+0x9a/0x120 [ 451.619779] ? lock_sock_nested+0x9a/0x120 [ 451.624030] alloc_encrypted_sg+0x8b/0x110 [ 451.628281] tls_sw_sendpage+0x733/0xef0 [ 451.632375] ? tls_sw_sendmsg+0x1310/0x1310 [ 451.636714] ? mutex_trylock+0x2b0/0x2b0 [ 451.640793] ? lock_downgrade+0x900/0x900 [ 451.644958] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 17:38:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x100000000000000}, 0x0) [ 451.650775] ? perf_trace_lock+0x14d/0x7a0 [ 451.655034] ? _parse_integer+0x180/0x180 [ 451.659212] ? tls_sw_sendmsg+0x1310/0x1310 [ 451.663549] inet_sendpage+0x1de/0x740 [ 451.667458] ? inet_sendmsg+0x690/0x690 [ 451.671452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.677006] kernel_sendpage+0x93/0xf0 [ 451.680931] ? inet_sendmsg+0x690/0x690 [ 451.684920] sock_sendpage+0x8c/0xc0 [ 451.688658] ? kernel_sendpage+0xf0/0xf0 [ 451.692743] pipe_to_sendpage+0x2d0/0x400 [ 451.696903] ? generic_pipe_buf_nosteal+0x10/0x10 [ 451.701758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.707305] ? splice_from_pipe_next.part.10+0x296/0x340 [ 451.712795] __splice_from_pipe+0x38b/0x7c0 [ 451.717136] ? generic_pipe_buf_nosteal+0x10/0x10 [ 451.722000] splice_from_pipe+0x1ec/0x340 [ 451.726172] ? generic_pipe_buf_nosteal+0x10/0x10 [ 451.726189] ? splice_shrink_spd+0xd0/0xd0 [ 451.726211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.735292] ? security_file_permission+0x1c2/0x230 [ 451.735322] generic_splice_sendpage+0x3c/0x50 [ 451.735349] ? splice_from_pipe+0x340/0x340 [ 451.735368] do_splice+0x64a/0x1430 [ 451.758420] ? __sb_end_write+0xd9/0x110 [ 451.762523] ? opipe_prep.part.13+0x3b0/0x3b0 [ 451.767052] __x64_sys_splice+0x2c1/0x330 [ 451.771215] do_syscall_64+0x1b9/0x820 [ 451.775110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 451.780491] ? syscall_return_slowpath+0x5e0/0x5e0 [ 451.785435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.790300] ? trace_hardirqs_on_caller+0x310/0x310 [ 451.795346] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 451.800378] ? prepare_exit_to_usermode+0x291/0x3b0 [ 451.805409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.810277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.815475] RIP: 0033:0x457519 [ 451.818668] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.837595] RSP: 002b:00007f693eb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 451.845308] RAX: ffffffffffffffda RBX: 00007f693eb0dc90 RCX: 0000000000457519 [ 451.852568] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 451.859820] RBP: 000000000072bf00 R08: 0000000000000008 R09: 0000000000000000 [ 451.867076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f693eb0e6d4 [ 451.874330] R13: 00000000004c4f02 R14: 00000000004d79e0 R15: 0000000000000006 17:38:18 executing program 5: r0 = add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="8fc1bc17624f0c1d93b6f2bc39ca185198fc20eb104cb7b11354fa", 0x1b, 0x0) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1}, &(0x7f0000000500)=""/89, 0x59, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)="585ccbe4ed83b8361f00000000297b6897b66147b3c7218a9169a85ea0bdc9e1587a050000000000f1ff42e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d25500200000035c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5a7d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40000e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725390000000000", 0xc0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r3, r2, r2}, &(0x7f0000000240)=""/240, 0xf0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) keyctl$reject(0x13, r3, 0x7ff, 0x9, r3) 17:38:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000000000)="290000002100190000003fffffff29260200000000e80001040000040d000d00ea1100000025000000", 0x29}], 0x1) r1 = dup3(r0, r0, 0x80000) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 17:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) 17:38:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)="65637279707466738c", 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:18 executing program 4 (fault-call:11 fault-nth:1): pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000140), 0x1c) r3 = socket$inet6(0xa, 0x3, 0x800000000000008) ioctl(r3, 0x8912, &(0x7f00000000c0)="15bf6234488dd25d726070") ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x1f) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 17:38:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0), &(0x7f0000000080)=0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") [ 451.972159] FAULT_INJECTION: forcing a failure. [ 451.972159] name failslab, interval 1, probability 0, space 0, times 0 [ 452.035605] netlink: 'syz-executor0': attribute type 13 has an invalid length. [ 452.067015] netlink: 'syz-executor0': attribute type 13 has an invalid length. [ 452.075318] CPU: 1 PID: 30758 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #278 [ 452.082708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.092062] Call Trace: [ 452.094660] dump_stack+0x1c4/0x2b4 [ 452.098829] ? dump_stack_print_info.cold.2+0x52/0x52 [ 452.104060] should_fail.cold.4+0xa/0x17 [ 452.108132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 452.113234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 452.118773] ? tcp_leave_memory_pressure+0x2a/0x110 [ 452.123794] ? tcp_enter_memory_pressure+0x120/0x120 [ 452.128903] ? __sk_mem_raise_allocated+0x721/0x1800 [ 452.134010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.139556] ? perf_trace_lock+0x14d/0x7a0 [ 452.143797] ? zap_class+0x640/0x640 [ 452.147517] ? zap_class+0x640/0x640 [ 452.151238] ? fs_reclaim_acquire+0x20/0x20 [ 452.155565] ? lock_downgrade+0x900/0x900 [ 452.159719] ? ___might_sleep+0x1ed/0x300 [ 452.163885] ? arch_local_save_flags+0x40/0x40 [ 452.168482] __should_failslab+0x124/0x180 [ 452.172720] should_failslab+0x9/0x14 [ 452.176529] __kmalloc+0x2d4/0x760 [ 452.180099] ? tls_push_record+0x107/0x1480 [ 452.184435] tls_push_record+0x107/0x1480 [ 452.188587] ? check_preemption_disabled+0x48/0x200 [ 452.193632] ? lock_sock_nested+0x9a/0x120 [ 452.197883] ? lock_sock_nested+0x9a/0x120 [ 452.202155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.207702] tls_sw_sendpage+0x5fb/0xef0 [ 452.211777] ? tls_sw_sendmsg+0x1310/0x1310 [ 452.216110] ? mutex_trylock+0x2b0/0x2b0 [ 452.220175] ? lock_downgrade+0x900/0x900 [ 452.224330] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 452.230143] ? perf_trace_lock+0x14d/0x7a0 [ 452.234386] ? _parse_integer+0x180/0x180 [ 452.238544] ? tls_sw_sendmsg+0x1310/0x1310 [ 452.242883] inet_sendpage+0x1de/0x740 [ 452.246777] ? inet_sendmsg+0x690/0x690 [ 452.250751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.256296] kernel_sendpage+0x93/0xf0 [ 452.260180] ? inet_sendmsg+0x690/0x690 [ 452.264163] sock_sendpage+0x8c/0xc0 [ 452.267920] ? kernel_sendpage+0xf0/0xf0 [ 452.272018] pipe_to_sendpage+0x2d0/0x400 [ 452.276168] ? generic_pipe_buf_nosteal+0x10/0x10 [ 452.281010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.286550] ? splice_from_pipe_next.part.10+0x296/0x340 [ 452.292008] __splice_from_pipe+0x38b/0x7c0 [ 452.296343] ? generic_pipe_buf_nosteal+0x10/0x10 [ 452.301194] splice_from_pipe+0x1ec/0x340 [ 452.305377] ? generic_pipe_buf_nosteal+0x10/0x10 [ 452.310245] ? splice_shrink_spd+0xd0/0xd0 [ 452.314485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.320025] ? security_file_permission+0x1c2/0x230 [ 452.325045] generic_splice_sendpage+0x3c/0x50 [ 452.329627] ? splice_from_pipe+0x340/0x340 [ 452.333963] do_splice+0x64a/0x1430 [ 452.337601] ? __sb_end_write+0xd9/0x110 [ 452.341679] ? opipe_prep.part.13+0x3b0/0x3b0 [ 452.346282] __x64_sys_splice+0x2c1/0x330 [ 452.350436] do_syscall_64+0x1b9/0x820 [ 452.354328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 452.359710] ? syscall_return_slowpath+0x5e0/0x5e0 [ 452.364643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.369503] ? trace_hardirqs_on_caller+0x310/0x310 [ 452.374523] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 452.379544] ? prepare_exit_to_usermode+0x291/0x3b0 [ 452.384569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.389438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.394651] RIP: 0033:0x457519 [ 452.397848] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.416758] RSP: 002b:00007f693eb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 452.424470] RAX: ffffffffffffffda RBX: 00007f693eb0dc90 RCX: 0000000000457519 17:38:18 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f000068cffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080)=0x9, 0x4) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$sock_int(r0, 0x1, 0x80000000009, &(0x7f0000f0fffc)=0x77a, 0x4) r1 = accept(r0, &(0x7f00000000c0)=@nfc, &(0x7f0000000000)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, r2, 0x70c, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4048000) openat$userio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/userio\x00', 0x80, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x20040, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000300)=0xffffffffffffffff) [ 452.431749] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 452.439016] RBP: 000000000072bf00 R08: 0000000000000008 R09: 0000000000000000 [ 452.446282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f693eb0e6d4 [ 452.453547] R13: 00000000004c4f02 R14: 00000000004d79e0 R15: 0000000000000006 17:38:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x2000000}, 0x0) 17:38:18 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000740)='ecryptfs\x00'}, 0xfffffffffffffd43) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00'}, 0x118) clone(0x1ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000280)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19") 17:38:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79, 0x0, [0x52]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000000000002000000000000000000000004"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='/dev/kvm\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r3) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) [ 452.675265] kasan: CONFIG_KASAN_INLINE enabled [ 452.680011] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 452.711767] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 452.718032] CPU: 0 PID: 30758 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #278 [ 452.725397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.734772] RIP: 0010:scatterwalk_copychunks+0x4b7/0x660 [ 452.740237] Code: 4c 89 f0 48 c1 e8 03 80 3c 08 00 0f 85 2b 01 00 00 49 8d 45 08 4d 89 2e 48 bf 00 00 00 00 00 fc ff df 48 89 45 b0 48 c1 e8 03 <0f> b6 04 38 84 c0 74 08 3c 03 0f 8e f4 00 00 00 48 8b 45 c8 45 8b [ 452.759169] RSP: 0018:ffff8801c2c66d90 EFLAGS: 00010202 [ 452.764539] RAX: 0000000000000001 RBX: 000000000000001e RCX: dffffc0000000000 [ 452.771819] RDX: 0000000000040000 RSI: ffffffff83890602 RDI: dffffc0000000000 [ 452.779097] RBP: ffff8801c2c66df0 R08: ffff8801bd684300 R09: ffffed0039bce001 [ 452.786377] R10: ffffed0039bce003 R11: ffff8801cde7001d R12: 000000000000001e [ 452.793671] R13: 0000000000000000 R14: ffff8801c2c66e38 R15: 0000000000000001 [ 452.800956] FS: 00007f693eb0e700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 452.809225] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 452.815113] CR2: 0000000020000040 CR3: 000000017909e000 CR4: 00000000001406f0 [ 452.822385] Call Trace: [ 452.824991] scatterwalk_map_and_copy+0x1df/0x2c0 [ 452.829861] ? scatterwalk_copychunks+0x660/0x660 [ 452.834724] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 452.840299] ? kernel_fpu_enable+0x23/0x40 [ 452.844556] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 452.850117] gcmaes_crypt_by_sg+0x1246/0x2110 [ 452.854642] ? aesni_gcm_enc_avx2+0x180/0x180 [ 452.859144] ? debug_smp_processor_id+0x1c/0x20 [ 452.863838] ? preempt_notifier_register+0x200/0x200 [ 452.868990] ? __switch_to_asm+0x34/0x70 [ 452.873076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 452.878107] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 452.882894] ? zap_class+0x640/0x640 [ 452.886621] ? is_bpf_text_address+0xac/0x170 [ 452.891145] ? lock_downgrade+0x900/0x900 [ 452.895350] ? is_bpf_text_address+0xd3/0x170 [ 452.899874] ? kernel_text_address+0x79/0xf0 [ 452.904285] ? __kernel_text_address+0xd/0x40 [ 452.908796] ? unwind_get_return_address+0x61/0xa0 [ 452.913735] ? __save_stack_trace+0x8d/0xf0 [ 452.918075] gcmaes_encrypt.constprop.15+0x7d7/0x1190 [ 452.923294] ? generic_gcmaes_decrypt+0x190/0x190 [ 452.928141] ? tls_push_record+0x107/0x1480 [ 452.932468] ? tls_sw_sendpage+0x5fb/0xef0 [ 452.936711] ? inet_sendpage+0x1de/0x740 [ 452.940784] ? kernel_sendpage+0x93/0xf0 [ 452.944848] ? sock_sendpage+0x8c/0xc0 [ 452.948743] ? pipe_to_sendpage+0x2d0/0x400 [ 452.953082] ? __splice_from_pipe+0x38b/0x7c0 [ 452.957586] ? splice_from_pipe+0x1ec/0x340 [ 452.961923] ? generic_splice_sendpage+0x3c/0x50 [ 452.966716] ? do_syscall_64+0x1b9/0x820 [ 452.970786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.976161] ? do_raw_spin_lock+0xc1/0x200 [ 452.980426] ? zap_class+0x640/0x640 [ 452.984150] ? fs_reclaim_acquire+0x20/0x20 [ 452.988497] ? lock_downgrade+0x900/0x900 [ 452.992671] ? ___might_sleep+0x1ed/0x300 [ 452.996835] ? trace_hardirqs_on+0xbd/0x310 [ 453.001184] generic_gcmaes_encrypt+0x12d/0x186 [ 453.005902] ? generic_gcmaes_encrypt+0x12d/0x186 [ 453.010756] ? helper_rfc4106_encrypt+0x4a0/0x4a0 [ 453.015639] ? __kmalloc+0x31c/0x760 [ 453.019370] gcmaes_wrapper_encrypt+0x162/0x200 [ 453.024093] tls_push_record+0x9ca/0x1480 [ 453.028275] ? check_preemption_disabled+0x48/0x200 [ 453.033306] tls_sw_sendpage+0x5fb/0xef0 [ 453.037394] ? tls_sw_sendmsg+0x1310/0x1310 [ 453.041725] ? mutex_trylock+0x2b0/0x2b0 [ 453.045797] ? lock_downgrade+0x900/0x900 [ 453.050018] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 453.055822] ? perf_trace_lock+0x14d/0x7a0 [ 453.060088] ? _parse_integer+0x180/0x180 [ 453.064245] ? tls_sw_sendmsg+0x1310/0x1310 [ 453.068593] inet_sendpage+0x1de/0x740 [ 453.072500] ? inet_sendmsg+0x690/0x690 [ 453.076486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.082035] kernel_sendpage+0x93/0xf0 [ 453.085934] ? inet_sendmsg+0x690/0x690 [ 453.089924] sock_sendpage+0x8c/0xc0 [ 453.093659] ? kernel_sendpage+0xf0/0xf0 [ 453.097727] pipe_to_sendpage+0x2d0/0x400 [ 453.101890] ? generic_pipe_buf_nosteal+0x10/0x10 [ 453.106745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.112291] ? splice_from_pipe_next.part.10+0x296/0x340 [ 453.117752] __splice_from_pipe+0x38b/0x7c0 [ 453.122080] ? generic_pipe_buf_nosteal+0x10/0x10 [ 453.126962] splice_from_pipe+0x1ec/0x340 [ 453.131114] ? generic_pipe_buf_nosteal+0x10/0x10 [ 453.135980] ? splice_shrink_spd+0xd0/0xd0 [ 453.140226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.145774] ? security_file_permission+0x1c2/0x230 [ 453.150803] generic_splice_sendpage+0x3c/0x50 [ 453.155392] ? splice_from_pipe+0x340/0x340 [ 453.159738] do_splice+0x64a/0x1430 [ 453.163391] ? __sb_end_write+0xd9/0x110 [ 453.167467] ? opipe_prep.part.13+0x3b0/0x3b0 [ 453.172030] __x64_sys_splice+0x2c1/0x330 [ 453.176226] do_syscall_64+0x1b9/0x820 [ 453.180137] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 453.185512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 453.190454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.195309] ? trace_hardirqs_on_caller+0x310/0x310 [ 453.200362] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 453.205392] ? prepare_exit_to_usermode+0x291/0x3b0 [ 453.210420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.215278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.220485] RIP: 0033:0x457519 [ 453.223698] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.242608] RSP: 002b:00007f693eb0dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 453.250364] RAX: ffffffffffffffda RBX: 00007f693eb0dc90 RCX: 0000000000457519 [ 453.257644] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 453.264944] RBP: 000000000072bf00 R08: 0000000000000008 R09: 0000000000000000 17:38:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="b3b60ced5c54dbb70000000000000000", 0xfffffffffffffc94) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x200000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000480)={0x6, 0x0, [{0x4, 0x41, &(0x7f0000000140)=""/65}, {0xd004, 0x58, &(0x7f00000001c0)=""/88}, {0x6000, 0x9b, &(0x7f0000000240)=""/155}, {0x100000, 0x62, &(0x7f0000000300)=""/98}, {0x17001, 0x2, &(0x7f00000000c0)=""/2}, {0x1000, 0xdc, &(0x7f0000000380)=""/220}]}) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x620, 0x0) recvmmsg(r2, &(0x7f0000000580)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 17:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0xf0ffffff}, 0x0) 17:38:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2}, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000)=[@in={0x2, 0x0, @broadcast}], 0x10) 17:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0xec0}, 0x0) 17:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x200000000000000}, 0x0) 17:38:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}, 0x1, 0x3000000}, 0x0) [ 453.272217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f693eb0e6d4 [ 453.279492] R13: 00000000004c4f02 R14: 00000000004d79e0 R15: 0000000000000006 [ 453.286794] Modules linked in: [ 453.291503] kobject: 'loop5' (000000001f44964b): kobject_uevent_env [ 453.310406] kobject: 'loop5' (000000001f44964b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 453.326374] kobject: 'rx-0' (000000004917235f): kobject_cleanup, parent 0000000000da53b2 [ 453.335599] kobject: 'rx-0' (000000004917235f): auto cleanup 'remove' event [ 453.344276] kobject: 'loop3' (00000000ae5918b3): kobject_uevent_env [ 453.345528] kobject: 'kvm' (0000000053da7c32): kobject_uevent_env [ 453.351155] kobject: 'rx-0' (000000004917235f): kobject_uevent_env [ 453.364247] kobject: 'loop3' (00000000ae5918b3): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 453.375572] kobject: 'rx-0' (000000004917235f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 453.386600] kobject: 'loop5' (000000001f44964b): kobject_uevent_env [ 453.393607] kobject: 'rx-0' (000000004917235f): auto cleanup kobject_del [ 453.402054] kobject: 'loop5' (000000001f44964b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 453.411920] kobject: 'rx-0' (000000004917235f): calling ktype release [ 453.423481] kobject: 'loop3' (00000000ae5918b3): kobject_uevent_env [ 453.430247] kobject: 'kvm' (0000000053da7c32): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 453.430305] kobject: 'rx-0': free name [ 453.446320] IPVS: ftp: loaded support on port[0] = 21 [ 453.456911] kobject: 'loop3' (00000000ae5918b3): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 453.466951] kobject: 'tx-0' (000000006c2f205d): kobject_cleanup, parent 0000000000da53b2 [ 453.476460] kobject: 'loop5' (000000001f44964b): kobject_uevent_env [ 453.481690] kobject: 'kvm' (0000000053da7c32): kobject_uevent_env [ 453.482905] kobject: 'loop5' (000000001f44964b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 453.492310] ---[ end trace aab2ed91a7612e5c ]--- [ 453.499071] kobject: 'tx-0' (000000006c2f205d): auto cleanup 'remove' event [ 453.515317] RIP: 0010:scatterwalk_copychunks+0x4b7/0x660 [ 453.518902] kobject: 'tx-0' (000000006c2f205d): kobject_uevent_env [ 453.522920] Code: 4c 89 f0 48 c1 e8 03 80 3c 08 00 0f 85 2b 01 00 00 49 8d 45 08 4d 89 2e 48 bf 00 00 00 00 00 fc ff df 48 89 45 b0 48 c1 e8 03 <0f> b6 04 38 84 c0 74 08 3c 03 0f 8e f4 00 00 00 48 8b 45 c8 45 8b [ 453.527601] kobject: 'tx-0' (000000006c2f205d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 453.565965] kobject: 'tx-0' (000000006c2f205d): auto cleanup kobject_del [ 453.576436] kobject: 'kvm' (0000000053da7c32): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 453.586013] kobject: 'tx-0' (000000006c2f205d): calling ktype release [ 453.605276] kobject: 'tx-0': free name [ 453.610047] RSP: 0018:ffff8801c2c66d90 EFLAGS: 00010202 [ 453.618597] kobject: 'queues' (0000000000da53b2): kobject_cleanup, parent (null) [ 453.626485] kobject: 'kvm' (0000000053da7c32): kobject_uevent_env [ 453.633288] kobject: 'kvm' (0000000053da7c32): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 453.639313] kobject: 'queues' (0000000000da53b2): calling ktype release [ 453.644462] RAX: 0000000000000001 RBX: 000000000000001e RCX: dffffc0000000000 [ 453.650161] kobject: 'queues' (0000000000da53b2): kset_release [ 453.663700] kobject: 'queues': free name [ 453.665273] RDX: 0000000000040000 RSI: ffffffff83890602 RDI: dffffc0000000000 [ 453.669125] kobject: 'ip6_vti0' (000000008bfd31be): kobject_uevent_env [ 453.682508] kobject: 'ip6_vti0' (000000008bfd31be): kobject_uevent_env: uevent_suppress caused the event to drop! [ 453.696116] RBP: ffff8801c2c66df0 R08: ffff8801bd684300 R09: ffffed0039bce001 [ 453.703445] R10: ffffed0039bce003 R11: ffff8801cde7001d R12: 000000000000001e [ 453.711065] kobject: 'lo' (00000000ef5c6636): kobject_add_internal: parent: 'net', set: 'devices' [ 453.719944] kobject: 'kvm' (0000000053da7c32): kobject_uevent_env [ 453.721949] kobject: 'lo' (00000000ef5c6636): kobject_uevent_env [ 453.726956] R13: 0000000000000000 R14: ffff8801c2c66e38 R15: 0000000000000001 [ 453.733044] kobject: 'lo' (00000000ef5c6636): fill_kobj_path: path = '/devices/virtual/net/lo' [ 453.740056] FS: 00007f693eb0e700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 453.749807] kobject: 'queues' (00000000a0c02438): kobject_add_internal: parent: 'lo', set: '' [ 453.757591] kobject: 'kvm' (0000000053da7c32): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 453.766971] kobject: 'queues' (00000000a0c02438): kobject_uevent_env [ 453.775479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.775489] CR2: 00000000015ec7d0 CR3: 000000017909e000 CR4: 00000000001426e0 [ 453.775502] Kernel panic - not syncing: Fatal exception [ 453.776377] Kernel Offset: disabled [ 453.804934] Rebooting in 86400 seconds..