ffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = syz_open_dev$usb(&(0x7f00000012c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x400000) ioctl$BLKBSZSET(r2, 0x40041271, &(0x7f0000001300)=0x3ff) r3 = dup3(r0, r1, 0x0) r4 = add_key(&(0x7f0000001180)='rxrpc_s\x00', &(0x7f00000011c0)={'syz', 0x2}, &(0x7f0000001200)="aec925c57844ba22462a5f0ab6427b4c2072df52f14fd07eaafba151eb8e7cf0ff164129b43bf6154308d370c278a53865dcda42304c367f1118f9b465e3f7d779cf4a80cb80e74dccff8b2e80591ecbfc3f3bb40bb89f2661439522703c36d690d18e9c076a8d7c8146e96b6465cc1d5befacc0174f4a21b620347ec19843fe8d01861d158c1c40", 0x88, 0xfffffffffffffff9) add_key$user(&(0x7f0000001000)='user\x00', &(0x7f0000001040)={'syz', 0x3}, &(0x7f0000001080)="e69bbba2c88e2eb405dd02b6a36e7fb4ebb86bc07955f7893a6857ca494aadbc4cfc8efab78ac87c43df0ae1a9ef9a68e9ee3e9a558888081e90fa02f46b5779fc3f23aa5b3b3f59be62ef4dd1bba6d37e494c288f8a301196c54dcf7a109ed02dd007cee25d907f684243c20c9dd5b385221ee04cabbf675153e9ab08719d6f692217d5ab6386432d5235a83bb2ce3448bee8bc8d2d6383cc7feb49186ed90eb466e81bc00e6d079d930c1b5549b180d51b81e673ebd1b2d2d4039abb6d50be2df2db00a5598d28106811f0d9c3549e9ccc3a38d0bb7ba103043d69747793d9b266e1b6c718", 0xe6, r4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00004e9f6d)='Z', 0x1, 0x0, &(0x7f0000187ff0)={0x2, 0x4e20, @loopback}, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001340)='/dev/btrfs-control\x00', 0x10640, 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000000)=""/4096) 02:48:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x10], [], @loopback}}, r1}}, 0x48) 02:48:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x8000000000000000, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:43 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x7a00) 02:48:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc000000], [], @loopback}}, r1}}, 0x48) 02:48:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = syz_open_dev$usb(&(0x7f00000012c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x400000) ioctl$BLKBSZSET(r2, 0x40041271, &(0x7f0000001300)=0x3ff) r3 = dup3(r0, r1, 0x0) r4 = add_key(&(0x7f0000001180)='rxrpc_s\x00', &(0x7f00000011c0)={'syz', 0x2}, &(0x7f0000001200)="aec925c57844ba22462a5f0ab6427b4c2072df52f14fd07eaafba151eb8e7cf0ff164129b43bf6154308d370c278a53865dcda42304c367f1118f9b465e3f7d779cf4a80cb80e74dccff8b2e80591ecbfc3f3bb40bb89f2661439522703c36d690d18e9c076a8d7c8146e96b6465cc1d5befacc0174f4a21b620347ec19843fe8d01861d158c1c40", 0x88, 0xfffffffffffffff9) add_key$user(&(0x7f0000001000)='user\x00', &(0x7f0000001040)={'syz', 0x3}, &(0x7f0000001080)="e69bbba2c88e2eb405dd02b6a36e7fb4ebb86bc07955f7893a6857ca494aadbc4cfc8efab78ac87c43df0ae1a9ef9a68e9ee3e9a558888081e90fa02f46b5779fc3f23aa5b3b3f59be62ef4dd1bba6d37e494c288f8a301196c54dcf7a109ed02dd007cee25d907f684243c20c9dd5b385221ee04cabbf675153e9ab08719d6f692217d5ab6386432d5235a83bb2ce3448bee8bc8d2d6383cc7feb49186ed90eb466e81bc00e6d079d930c1b5549b180d51b81e673ebd1b2d2d4039abb6d50be2df2db00a5598d28106811f0d9c3549e9ccc3a38d0bb7ba103043d69747793d9b266e1b6c718", 0xe6, r4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00004e9f6d)='Z', 0x1, 0x0, &(0x7f0000187ff0)={0x2, 0x4e20, @loopback}, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001340)='/dev/btrfs-control\x00', 0x10640, 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000000)=""/4096) 02:48:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xa000000], [], @loopback}}, r1}}, 0x48) 02:48:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x700000000000000) 02:48:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x10], [], @loopback}}, r1}}, 0x48) 02:48:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x2, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = syz_open_dev$usb(&(0x7f00000012c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x400000) ioctl$BLKBSZSET(r2, 0x40041271, &(0x7f0000001300)=0x3ff) r3 = dup3(r0, r1, 0x0) r4 = add_key(&(0x7f0000001180)='rxrpc_s\x00', &(0x7f00000011c0)={'syz', 0x2}, &(0x7f0000001200)="aec925c57844ba22462a5f0ab6427b4c2072df52f14fd07eaafba151eb8e7cf0ff164129b43bf6154308d370c278a53865dcda42304c367f1118f9b465e3f7d779cf4a80cb80e74dccff8b2e80591ecbfc3f3bb40bb89f2661439522703c36d690d18e9c076a8d7c8146e96b6465cc1d5befacc0174f4a21b620347ec19843fe8d01861d158c1c40", 0x88, 0xfffffffffffffff9) add_key$user(&(0x7f0000001000)='user\x00', &(0x7f0000001040)={'syz', 0x3}, &(0x7f0000001080)="e69bbba2c88e2eb405dd02b6a36e7fb4ebb86bc07955f7893a6857ca494aadbc4cfc8efab78ac87c43df0ae1a9ef9a68e9ee3e9a558888081e90fa02f46b5779fc3f23aa5b3b3f59be62ef4dd1bba6d37e494c288f8a301196c54dcf7a109ed02dd007cee25d907f684243c20c9dd5b385221ee04cabbf675153e9ab08719d6f692217d5ab6386432d5235a83bb2ce3448bee8bc8d2d6383cc7feb49186ed90eb466e81bc00e6d079d930c1b5549b180d51b81e673ebd1b2d2d4039abb6d50be2df2db00a5598d28106811f0d9c3549e9ccc3a38d0bb7ba103043d69747793d9b266e1b6c718", 0xe6, r4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r1, &(0x7f00004e9f6d)='Z', 0x1, 0x0, &(0x7f0000187ff0)={0x2, 0x4e20, @loopback}, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001340)='/dev/btrfs-control\x00', 0x10640, 0x0) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000000)=""/4096) 02:48:43 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x80fe], [], @loopback}}, r1}}, 0x48) 02:48:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x1ac) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797a3091c410b0b8da27d322e7238ea35455a079eab677475e12389551fb92dc23f432e421a1fdca413878fabdff3f19c9a449de9bb15488b8154c913870e84237aa6e6004968718c024453d9c76662260448c57b4f528081111003388f94e12f5f3cc36021363eab1215a2a12398d2fe5b28c3cc49ad5554e6634504654cb657303cc7d64bf926eb2f389dffd3ea50590273ba89d"], 0x96) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00~\'\xfa\xd2\xf5\x92\xbbR\xa0\xe0g\xae]bJ\xc2\x85\xb8\xa8W\x92\xe7E0\xe2]\xc4\x1b\xed\xdc\xf7>$\xa5\xdb\xeaI\x81\x9a\x90,Z\xc6U\xb1y\xf9\xc3\x89\x86\xf3@\xfa\x89\xdd\xe9\xa3\x93\xe1\x84\xf8\xda\x0fu\xbe\x9a\x94H\xa6\xab\xa4\xc6q/w\xb8\x05g\x1d\xfaiMH/~\'\xe7\xad\r]\x0e\xd6|x\x92\xf8\x0e\xfe\x87\xccag\xeb\x9a\b\x84\x0e\xff@g\xa7\x96/\x9f\a\x16\x04\xe6', 0x200002, 0x0) fdatasync(r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cgroup.stat\x00\xb1L\xc1z\xd4\x8f\xd2ZN\xd3\x00&\xeeV\b\x06\x9f}\x93\xfef\xef\xc1kb\xa6\xf1 \x9dTY\xaa\xf5\x1e\xfar\xc4\xe5\xab\xac\xdc\xac\x98\xb0\x88\xb0\x16\xf5\xaf\xa9\xc3%\x14\x19\xde\xef\xb3\xa0$\xd2$\xcf4\xe8A\b\x84s\"x\xa9\x81X\xb4l\xa7\x8dv\n\xd1\x7f\xda\xc8\x87\x92\xb6\xee\n\xcb\x89#=\f\xa2\x12\xd12\xad7]\x1b\xf1\xdd\xa7\xdaq3hBe\xca\xa8\xbd\x8a\x00I\x11\x85\xd6%\x04\\;\x00\xda\xf7\xe0\xaem\xa8\x8d\t\xddB/\x84', 0x0, 0x0) ioctl$FICLONE(r2, 0x40049409, r2) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x1000000) 02:48:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x400000000000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:44 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') fcntl$setstatus(r1, 0x4, 0x443fc) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) r3 = dup3(r0, r2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x0, &(0x7f0000000140), &(0x7f0000000340)=0x4) fcntl$getownex(r0, 0x10, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000012c0)={@empty, @multicast2}, &(0x7f0000001300)=0xc) sendfile64(r2, r3, 0x0, 0x23b) fstat(r2, 0x0) lchown(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)={0x4, [0x6, 0x4, 0x6413, 0x20]}, 0xc) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x8, [0x40, 0xffffffffffffffe0, 0x7, 0xce1, 0x6, 0x5, 0x5, 0x0]}, 0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001340)={@local, @ipv4={[], [], @loopback}, @dev, 0x0, 0xa300, 0x0, 0x500, 0x7fff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14) 02:48:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x60], [], @loopback}}, r1}}, 0x48) 02:48:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6) 02:48:44 executing program 5: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000680)=0xe529) recvmmsg(r1, &(0x7f00000001c0)=[{{&(0x7f0000000740)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000c00), 0x104, &(0x7f0000004e40)=""/4096, 0xffffffffffffffde, 0x800}}], 0xf77, 0x0, &(0x7f0000000180)={0x77359400}) r2 = openat$mixer(0xffffffffffffff9c, 0x0, 0x200000020002, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000340)={0x1, 0xffffffffffffff9c}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000d80)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000b80)=0xfffffffffffffeca, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='aead\x00', r2}, 0x10) r3 = socket(0x0, 0x0, 0x0) r4 = syz_open_dev$usb(0x0, 0x9, 0x100) fstat(r3, &(0x7f0000000200)) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f0000000280)={0x5, 0x0, 0x6, 0x42, 0x8, 0x3, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x0, 0x2}}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:48:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:44 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0xf0ffffff7f0000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2001001000000000], [], @loopback}}, r1}}, 0x48) 02:48:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4) 02:48:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') fcntl$setstatus(r1, 0x4, 0x443fc) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) r3 = dup3(r0, r2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x0, &(0x7f0000000140), &(0x7f0000000340)=0x4) fcntl$getownex(r0, 0x10, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000012c0)={@empty, @multicast2}, &(0x7f0000001300)=0xc) sendfile64(r2, r3, 0x0, 0x23b) fstat(r2, 0x0) lchown(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)={0x4, [0x6, 0x4, 0x6413, 0x20]}, 0xc) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x8, [0x40, 0xffffffffffffffe0, 0x7, 0xce1, 0x6, 0x5, 0x5, 0x0]}, 0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001340)={@local, @ipv4={[], [], @loopback}, @dev, 0x0, 0xa300, 0x0, 0x500, 0x7fff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14) 02:48:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x15c5000000000000], [], @loopback}}, r1}}, 0x48) 02:48:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:44 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:44 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x300000000000000) 02:48:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x60000000], [], @loopback}}, r1}}, 0x48) [ 1209.681548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1209.786858] Error parsing options; rc = [-22] 02:48:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6377, 0x400001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xddb) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "7a99757dfb40d30c5436a153ef5b437540"}, 0x15) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e0000001000000000000000008001200020002000000000000000000300000000e0000000000000000000000000000000000000000d7bf6330000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 02:48:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x1000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2000000], [], @loopback}}, r1}}, 0x48) 02:48:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4800000000000000) 02:48:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff000000], [], @loopback}}, r1}}, 0x48) [ 1210.144576] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1210.168962] Error parsing options; rc = [-22] 02:48:45 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:45 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000080)={{0x7fffffff, 0xa}, {}, 0xfffffffe}) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) 02:48:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x2000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:45 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0xffefff7f) 02:48:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xffffff8d], [], @loopback}}, r1}}, 0x48) 02:48:45 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:45 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 1210.522728] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:45 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x4, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) [ 1210.584348] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1210.600496] Error parsing options; rc = [-22] 02:48:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4000) [ 1210.637509] Error parsing options; rc = [-22] 02:48:46 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x7ffffffff000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc00000000000000], [], @loopback}}, r1}}, 0x48) 02:48:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x300) 02:48:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x8000000000000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:46 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4c) 02:48:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) [ 1211.467510] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1211.521570] Error parsing options; rc = [-22] 02:48:46 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x5000000000000000], [], @loopback}}, r1}}, 0x48) 02:48:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x8) 02:48:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x100000000000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x600000000000000], [], @loopback}}, r1}}, 0x48) [ 1211.730165] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x4000000, 0x0, 0x1, 0x0, r0, 0x0}]) 02:48:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x7a000000) [ 1211.827679] Error parsing options; rc = [-22] 02:48:47 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x400000000000000, 0x1, 0x0, r0, 0x0}]) 02:48:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x8000000) [ 1212.569385] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:47 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) write$binfmt_elf32(r2, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 02:48:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec00000], [], @loopback}}, r1}}, 0x48) 02:48:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x68) 02:48:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x100000000000000, 0x1, 0x0, r0, 0x0}]) [ 1212.610564] Error parsing options; rc = [-22] [ 1212.706201] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x500000000000000) 02:48:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x2000000, 0x1, 0x0, r0, 0x0}]) [ 1212.746935] Error parsing options; rc = [-22] 02:48:48 executing program 2: syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x2001) 02:48:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xe00000000000000], [], @loopback}}, r1}}, 0x48) 02:48:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x4000000, 0x1, 0x0, r0, 0x0}]) 02:48:48 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) 02:48:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4000000) 02:48:48 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x101000) fcntl$setsig(r0, 0xa, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) close(r1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x3b) setsockopt$inet_tcp_int(r4, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) fcntl$setpipe(r2, 0x407, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000140)={0x3, {{0xa, 0x4e24, 0xfff, @mcast1}}, 0x0, 0x2, [{{0xa, 0x4e23, 0x9, @empty, 0x1}}, {{0xa, 0x4e23, 0x6, @mcast1, 0xfff}}]}, 0x18c) sendto$inet(r4, &(0x7f0000000000), 0xfffffffffffffe6c, 0x0, 0x0, 0x0) splice(r1, 0x0, r2, 0x0, 0x11004, 0x0) 02:48:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xc515], [], @loopback}}, r1}}, 0x48) 02:48:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x1000000, 0x1, 0x0, r0, 0x0}]) 02:48:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:49 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYRES16], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x20]}) 02:48:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4c000000) 02:48:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfe800000], [], @loopback}}, r1}}, 0x48) [ 1213.714728] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x8000000000000000, 0x1, 0x0, r0, 0x0}]) [ 1213.812056] Error parsing options; rc = [-22] 02:48:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010000707001b2672bbb6074eb3361902c0fa4de2fd7abd9b4335df37df0db91d6b2cfc6e2206f4e8c6deb9f4d04892030091b488ab58f26f64da5c4ced2106e368cbb04788919353e5b54aa8", @ANYRES32=0x0, @ANYBLOB="000000000000e9ff1b0912000c000100856c799aff4b6c307f0002080800110004000000"], 0x3c}}, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/26, 0x1a) [ 1214.000158] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. [ 1214.023970] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. 02:48:49 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) 02:48:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3f000000], [], @loopback}}, r1}}, 0x48) 02:48:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6c00) 02:48:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x4, 0x1, 0x0, r0, 0x0}]) 02:48:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:49 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x6, 0x2000) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e20, @rand_addr=0x5}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x200, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)='bcsf0\x00', 0x3, 0x100}) syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x44002, 0x0) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @connect={{0x8}}}], 0x30) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0086426, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc008641d, &(0x7f0000000380)={r3, &(0x7f0000000300)=""/82}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x4, 0x0, [], [{0x6, 0x0, 0x1, 0x5, 0x0, 0x200}, {0x5, 0x0, 0x8, 0x3, 0x4, 0xd64}], [[], [], [], []]}) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000007c0)=""/197, 0x4}], 0x200000000000014c, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000580)={0x1, 0x2, 0x5893, 0x9, 0x1, 0xa70}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffef9) [ 1214.586564] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1214.601674] Error parsing options; rc = [-22] 02:48:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xa], [], @loopback}}, r1}}, 0x48) 02:48:49 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x6, 0x2000) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e20, @rand_addr=0x5}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x200, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)='bcsf0\x00', 0x3, 0x100}) syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x44002, 0x0) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @connect={{0x8}}}], 0x30) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0086426, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc008641d, &(0x7f0000000380)={r3, &(0x7f0000000300)=""/82}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x4, 0x0, [], [{0x6, 0x0, 0x1, 0x5, 0x0, 0x200}, {0x5, 0x0, 0x8, 0x3, 0x4, 0xd64}], [[], [], [], []]}) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000007c0)=""/197, 0x4}], 0x200000000000014c, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000580)={0x1, 0x2, 0x5893, 0x9, 0x1, 0xa70}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffef9) 02:48:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x7ffffffff000, 0x1, 0x0, r0, 0x0}]) 02:48:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x7fffefff) 02:48:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:50 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @loopback}}, r1}}, 0x48) 02:48:50 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) [ 1214.904284] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, 0x0}]) 02:48:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x74) [ 1214.957745] Error parsing options; rc = [-22] 02:48:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) [ 1215.030038] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1215.094516] Error parsing options; rc = [-22] 02:48:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4800000000000000], [], @loopback}}, r1}}, 0x48) 02:48:50 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0xf0ffffff7f0000, 0x1, 0x0, r0, 0x0}]) 02:48:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x100000000000000) [ 1215.219544] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1215.265083] Error parsing options; rc = [-22] 02:48:50 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) 02:48:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 02:48:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x7800000000000000], [], @loopback}}, r1}}, 0x48) 02:48:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x200000000000000, 0x1, 0x0, r0, 0x0}]) 02:48:50 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) [ 1215.477067] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xe000000], [], @loopback}}, r1}}, 0x48) 02:48:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0xa00000000000000) [ 1215.554421] Error parsing options; rc = [-22] [ 1215.572703] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1215.681568] Error parsing options; rc = [-22] 02:48:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 02:48:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x15c50000], [], @loopback}}, r1}}, 0x48) 02:48:51 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:51 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6c000000) 02:48:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1215.878639] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1215.900775] Error parsing options; rc = [-22] 02:48:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0}]) [ 1215.995553] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x48000000], [], @loopback}}, r1}}, 0x48) [ 1216.067794] Error parsing options; rc = [-22] 02:48:51 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0xf0ff7f) 02:48:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 02:48:51 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 02:48:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4], [], @loopback}}, r1}}, 0x48) [ 1216.254209] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1216.290792] Error parsing options; rc = [-22] 02:48:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x900000000000000) [ 1216.342267] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1216.406229] Error parsing options; rc = [-22] 02:48:51 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4800], [], @loopback}}, r1}}, 0x48) 02:48:51 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r0, 0x0}]) [ 1216.585144] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 1216.634670] Error parsing options; rc = [-22] 02:48:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x900], [], @loopback}}, r1}}, 0x48) 02:48:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6c00000000000000) [ 1216.685796] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1216.771932] Error parsing options; rc = [-22] 02:48:52 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 02:48:52 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:48:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x10000000], [], @loopback}}, r1}}, 0x48) [ 1216.970309] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0xffffffff00000000) [ 1217.072715] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1217.082673] Error parsing options; rc = [-22] [ 1217.086619] Error parsing options; rc = [-22] 02:48:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x50], [], @loopback}}, r1}}, 0x48) 02:48:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x300, 0x0, r0, 0x0}]) 02:48:52 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x10000000000000], [], @loopback}}, r1}}, 0x48) [ 1217.337037] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1217.372772] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:52 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x600000000000000) [ 1217.394996] Error parsing options; rc = [-22] [ 1217.441292] Error parsing options; rc = [-22] 02:48:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4, 0x0, r0, 0x0}]) [ 1217.475286] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:52 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x8000000], [], @loopback}}, r1}}, 0x48) [ 1217.596403] Error parsing options; rc = [-22] 02:48:52 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) [ 1217.633035] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x48000000) [ 1217.699586] Error parsing options; rc = [-22] 02:48:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x8000000000000000, r0, 0x0}]) 02:48:53 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x40000000], [], @loopback}}, r1}}, 0x48) [ 1217.769430] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1217.844935] Error parsing options; rc = [-22] 02:48:53 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) [ 1217.889385] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6000000) 02:48:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xe00], [], @loopback}}, r1}}, 0x48) 02:48:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x2000000, r0, 0x0}]) [ 1217.967656] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1217.992503] Error parsing options; rc = [-22] [ 1218.027924] Error parsing options; rc = [-22] 02:48:53 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x600) 02:48:53 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:53 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) [ 1218.180060] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4000000, r0, 0x0}]) 02:48:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc00], [], @loopback}}, r1}}, 0x48) [ 1218.271575] Error parsing options; rc = [-22] 02:48:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x900) [ 1218.295610] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1218.310675] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:53 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') [ 1218.359282] Error parsing options; rc = [-22] [ 1218.364377] Error parsing options; rc = [-22] 02:48:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00], [], @loopback}}, r1}}, 0x48) 02:48:53 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x1000000, r0, 0x0}]) [ 1218.472605] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x7a00000000000000) [ 1218.570845] Error parsing options; rc = [-22] 02:48:53 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) [ 1218.594844] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1218.616506] Error parsing options; rc = [-22] 02:48:53 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) 02:48:53 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x10000120], [], @loopback}}, r1}}, 0x48) 02:48:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4, r0, 0x0}]) 02:48:54 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) [ 1218.770159] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1218.793117] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0xffefff7f00000000) [ 1218.853190] Error parsing options; rc = [-22] [ 1218.870160] Error parsing options; rc = [-22] [ 1218.874086] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xa00000000000000], [], @loopback}}, r1}}, 0x48) [ 1218.932669] Error parsing options; rc = [-22] 02:48:54 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) 02:48:54 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x7ffffffff000, r0, 0x0}]) 02:48:54 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) [ 1219.084182] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.140405] Error parsing options; rc = [-22] 02:48:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x500000000000000], [], @loopback}}, r1}}, 0x48) [ 1219.163784] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.180380] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.232250] Error parsing options; rc = [-22] [ 1219.246288] Error parsing options; rc = [-22] 02:48:54 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:48:54 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x400000000000000, r0, 0x0}]) 02:48:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xa00], [], @loopback}}, r1}}, 0x48) 02:48:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x9000000) 02:48:54 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) [ 1219.459101] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.474055] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.493968] Error parsing options; rc = [-22] 02:48:54 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x40000000) [ 1219.520901] Error parsing options; rc = [-22] [ 1219.531634] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x78], [], @loopback}}, r1}}, 0x48) [ 1219.589020] Error parsing options; rc = [-22] 02:48:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x200000000000000, r0, 0x0}]) [ 1219.649445] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:55 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) 02:48:55 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') [ 1219.722715] Error parsing options; rc = [-22] 02:48:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x10000000) 02:48:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3f00000000000000], [], @loopback}}, r1}}, 0x48) 02:48:55 executing program 4: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) [ 1219.841353] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, 0x0}]) [ 1219.899986] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1219.924615] Error parsing options; rc = [-22] 02:48:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x74000000) [ 1219.984811] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:55 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) [ 1220.026660] Error parsing options; rc = [-22] 02:48:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000000000000], [], @loopback}}, r1}}, 0x48) [ 1220.063074] Error parsing options; rc = [-22] 02:48:55 executing program 4: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:48:55 executing program 2: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') 02:48:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x100000000000000, r0, 0x0}]) [ 1220.135582] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1220.155354] Error parsing options; rc = [-22] 02:48:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000000], [], @loopback}}, r1}}, 0x48) 02:48:55 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) 02:48:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4c00) [ 1220.271228] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1220.332160] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1220.364460] Error parsing options; rc = [-22] 02:48:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xf0ffffff7f0000, r0, 0x0}]) [ 1220.383837] Error parsing options; rc = [-22] 02:48:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x7000000], [], @loopback}}, r1}}, 0x48) [ 1220.426666] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:55 executing program 4: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) [ 1220.504879] Error parsing options; rc = [-22] 02:48:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000700)=""/250, 0xfa) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) 02:48:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]) 02:48:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x2) 02:48:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x40000], [], @loopback}}, r1}}, 0x48) [ 1220.655893] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:55 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:48:55 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 1220.722581] Error parsing options; rc = [-22] 02:48:56 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6c) 02:48:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x400000000000000}]) 02:48:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x78000000], [], @loopback}}, r1}}, 0x48) [ 1220.784768] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1220.803357] ptrace attach of "/root/syz-executor2"[17652] was attempted by "/root/syz-executor2"[7199] [ 1220.888546] Error parsing options; rc = [-22] 02:48:56 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1220.921311] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1220.935138] ptrace attach of "/root/syz-executor2"[17652] was attempted by "/root/syz-executor2"[7216] [ 1220.947281] Error parsing options; rc = [-22] 02:48:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0], [], @loopback}}, r1}}, 0x48) 02:48:56 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x402) 02:48:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x3) 02:48:56 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x200000000000000}]) [ 1221.111602] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:56 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x402) [ 1221.186277] Error parsing options; rc = [-22] [ 1221.203551] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x6800000000000000) [ 1221.240463] Error parsing options; rc = [-22] 02:48:56 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:48:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc], [], @loopback}}, r1}}, 0x48) 02:48:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x8000000000000000}]) 02:48:56 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000300)={0x65, 0x0, 0x0, "c305f175c24adc78567b31033852513a86a2af065002e717dbf38cd685d0006a8175d2973d74cc6e1d5e737576219d8af2068f1505e97ce5659c88f17f6d067bddc81c8976198a8af773c8c3c4aa2deb882d20443c52fca7a383f77afdb7e3246006baafad"}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fde000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000580)=0x2fff) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000002c0)="91dccd4632242b2aeb98f32a76bcd8ef70de99baef6c2f8d6901e5329858feac36a859fad2536dc9bb7317b35def7023286b", 0x32}], 0x1, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000200)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1221.455346] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1221.471335] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xe], [], @loopback}}, r1}}, 0x48) [ 1221.512221] Error parsing options; rc = [-22] [ 1221.544516] Error parsing options; rc = [-22] 02:48:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2000000}]) 02:48:56 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:48:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x4800) 02:48:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3], [], @loopback}}, r1}}, 0x48) 02:48:56 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x4}]) 02:48:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x200001) 02:48:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x6000000000000000], [], @loopback}}, r1}}, 0x48) 02:48:57 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1221.847942] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x7a) [ 1221.896806] Error parsing options; rc = [-22] 02:48:57 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) 02:48:57 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x1000000000000000) 02:48:57 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1222.026495] ptrace attach of "/root/syz-executor2"[17652] was attempted by "/root/syz-executor2"[7322] 02:48:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x7ffffffff000}]) 02:48:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xffffffff00000000], [], @loopback}}, r1}}, 0x48) [ 1222.090416] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1222.166524] Error parsing options; rc = [-22] 02:48:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="5400030400000000000000000000e269", 0x10) 02:48:57 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:57 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:48:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x1000000}]) 02:48:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x200000000000000) [ 1222.510493] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1222.512139] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1222.537172] Error parsing options; rc = [-22] 02:48:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) 02:48:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r3 = gettid() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000002c0)={r4}) clone(0x2e828903, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000001c0)={{0x2, 0x4e22, @rand_addr=0xfff}, {0x1, @remote}, 0x20, {0x2, 0x4e21, @multicast1}, 'team0\x00'}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20008000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r5, 0x0, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) tkill(r3, 0x8000000000000014) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x3, 0x7, 0x16d, 0x0, 0x100000000, 0x0, 0x7}, "84dfca10c6ed320a950dbfd4910a5ab89075d71bbf69d9f71d67d73e0ab549ff17a359829bb6cdf15885dcd46889e7bb4a573139d60744acba29902a099f46b0"}, 0x60) wait4(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 1222.566311] Error parsing options; rc = [-22] 02:48:57 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:48:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x4000000}]) 02:48:57 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x68000000) [ 1222.719128] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1222.738192] Error parsing options; rc = [-22] 02:48:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x6000000], [], @loopback}}, r1}}, 0x48) 02:48:58 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1222.802904] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x100000000000000}]) [ 1222.849762] Error parsing options; rc = [-22] 02:48:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) [ 1222.875955] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:48:58 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:48:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x700], [], @loopback}}, r1}}, 0x48) [ 1223.007978] Error parsing options; rc = [-22] 02:48:58 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:00 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xf0ffffff7f0000}]) 02:49:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x48], [], @loopback}}, r1}}, 0x48) 02:49:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) clock_nanosleep(0x8, 0x0, &(0x7f0000000080)={0x0, r0+10000000}, 0x0) 02:49:00 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x1}, 0x1, 0x0, 0x0, 0x2}, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x3, 0x58, 0x469aba51, 0x200, 0x0, 0x3ff}, 0x1}, 0xa) r2 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) sendmmsg$unix(r1, &(0x7f0000000440)=[{&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000002c0)="6c1a7e7497fcf99d7f28e83af6d59555535ffac5bc313fb22cceac102810a2f91a4bbcc69a9a96926539c2fa48607af1dd14454414b47b0dcc3a3b4e9a", 0x3d}], 0x1, &(0x7f0000000340)=[@cred={0x18, 0x1, 0x2, r3, r4, r5}, @rights={0x1c, 0x1, 0x1, [r1, r0, r1, r1]}, @cred={0x18, 0x1, 0x2, r2, r4, r5}, @rights={0x18, 0x1, 0x1, [r0, r0, r1]}, @cred={0x18, 0x1, 0x2, r2, r4, r5}, @rights={0x24, 0x1, 0x1, [r1, r0, r1, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r2, r4, r5}, @rights={0x10, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1, r1, r0]}, @cred={0x18, 0x1, 0x2, r3, r4, r5}], 0xf8, 0x80}], 0x1, 0x40001) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f00000001c0)='status\x00') ioctl$FIGETBSZ(r7, 0x2, &(0x7f0000000480)) preadv(r7, &(0x7f0000000180), 0x0, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000200)) 02:49:00 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1225.712340] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:01 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x6000], [], @loopback}}, r1}}, 0x48) 02:49:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') fanotify_mark(r0, 0x10, 0x10, r0, &(0x7f0000000000)='./file0\x00') ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1225.762558] Error parsing options; rc = [-22] 02:49:01 executing program 2: socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xfffffee1) dup3(r0, r1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) 02:49:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000}]) 02:49:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1225.881262] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1225.931541] Error parsing options; rc = [-22] [ 1225.952928] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x900000000000000], [], @loopback}}, r1}}, 0x48) 02:49:01 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1225.994126] Error parsing options; rc = [-22] 02:49:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fstatfs(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @initdev, 0x0, 0x0, 'wrr\x00'}, 0x2c) 02:49:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4}]) 02:49:01 executing program 0: getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x11b, 0x0) 02:49:01 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1226.103816] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xff00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:01 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) clock_gettime(0x0, 0x0) utimensat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 1226.232736] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1226.247266] Error parsing options; rc = [-22] [ 1226.268812] Error parsing options; rc = [-22] 02:49:01 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7ffffffff000}]) 02:49:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 02:49:01 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:01 executing program 2: socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xfffffee1) dup3(r0, r1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) writev(r1, 0x0, 0x0) 02:49:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x9000000], [], @loopback}}, r1}}, 0x48) [ 1226.477745] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1226.511945] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1226.523933] Error parsing options; rc = [-22] [ 1226.536527] Error parsing options; rc = [-22] 02:49:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2}]) 02:49:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:01 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:01 executing program 0: syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x9, 0x4200) io_setup(0x0, &(0x7f0000000000)=0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f0000000100)='\f:;', 0x3, 0x5, 0x0, 0x297345208076f7d8, r2}, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:01 executing program 2: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x4000000003, 0x0) dup3(r1, r0, 0x0) pread64(r1, &(0x7f0000000380)=""/137, 0x89, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="24000000220007031dfffd946f610500020000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:49:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3000000], [], @loopback}}, r1}}, 0x48) [ 1226.705654] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1226.724915] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x200000000000000}]) [ 1226.753742] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 1226.765087] Error parsing options; rc = [-22] [ 1226.772640] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 1226.782901] Error parsing options; rc = [-22] 02:49:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000600)={0x8000001, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @dev}, 0x44, 0x648, 0x7fff, 0x1, 0x0, 0x0, 0x6, 0x7, 0x800}) 02:49:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x3f00], [], @loopback}}, r1}}, 0x48) [ 1226.954946] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0xfffffffffffffc4d, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="dfb41bf536bde4b1df54fe536e000414521df5546364052904db8e2a6ae965399397e167d9a350c05e9df7517c536d7655ebdde394efb6cd483b9e33ca195d6c090f6b3fb3375674ae00000000000074000000000000000000000000000000"], 0x1}}, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) [ 1227.020354] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1227.053948] Error parsing options; rc = [-22] 02:49:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x8000000000000000}]) [ 1227.070398] Error parsing options; rc = [-22] 02:49:02 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='./bus\x00', 0x41042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) io_setup(0x0, &(0x7f0000000380)) creat(&(0x7f0000000400)='./bus\x00', 0x0) socket$key(0xf, 0x3, 0x2) 02:49:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x4000], [], @loopback}}, r1}}, 0x48) 02:49:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f00000000c0)=0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'io'}, {0x2d, 'pids'}]}, 0xa) 02:49:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000}]) [ 1227.238404] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1227.274713] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1227.332261] Error parsing options; rc = [-22] 02:49:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x100000000000000], [], @loopback}}, r1}}, 0x48) 02:49:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, 0x0) [ 1227.352470] Error parsing options; rc = [-22] 02:49:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x400000000000000}]) 02:49:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x8000, 0x3f, 0x6, 0x0, 0x9, 0xfff}) 02:49:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x700000000000000], [], @loopback}}, r1}}, 0x48) [ 1227.540472] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1227.579642] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) clone(0x2000000000007fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, 0x0, &(0x7f0000000180)) 02:49:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], [], @loopback}}, r1}}, 0x48) [ 1227.623557] Error parsing options; rc = [-22] [ 1227.627122] Error parsing options; rc = [-22] 02:49:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x100000000000000}]) 02:49:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], @loopback}}, r1}}, 0x48) [ 1227.854131] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1227.881439] Error parsing options; rc = [-22] [ 1227.884157] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1227.935165] Error parsing options; rc = [-22] 02:49:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="22fe8500a0ff08e7c1b95442d68d2221afb674d9dd0d53ae14d64e0c4e0340847c84e79459dd69715b2bf1b2cdeafdffe8f8f04d54ea6975e7a66d23124449c13114a67713dcaa1b"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$SG_IO(r1, 0x2285, &(0x7f0000000780)={0x53, 0xffffffffffffffff, 0x4, 0x9, @scatter={0x9, 0x0, &(0x7f0000000640)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000000100)=""/232, 0xe8}, {&(0x7f0000000200)=""/174, 0xae}, {&(0x7f00000002c0)=""/227, 0xe3}, {&(0x7f00000003c0)=""/253, 0xfd}, {&(0x7f00000004c0)=""/135, 0x87}, {&(0x7f0000000580)=""/29, 0x1d}, {&(0x7f0000000600)=""/30, 0x1e}]}, &(0x7f00000006c0)="e3087562", &(0x7f0000000700)=""/50, 0x80, 0x6, 0x0, &(0x7f0000000740)}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) munlockall() preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40186417, &(0x7f0000000840)={0x8, 0x8, 0x1, 0x5, 0x8, 0x5e4ae74a}) 02:49:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xf0ffffff7f0000}]) 02:49:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1228.015472] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1228.106644] Error parsing options; rc = [-22] 02:49:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xe000000], [], @loopback}}, r1}}, 0x48) [ 1228.128245] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1228.172402] Error parsing options; rc = [-22] [ 1228.274145] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1228.327576] Error parsing options; rc = [-22] 02:49:03 executing program 2: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) read$eventfd(r1, &(0x7f0000000640), 0x8) 02:49:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000}]) 02:49:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2000000], [], @loopback}}, r1}}, 0x48) 02:49:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f000000ac80)=[{{&(0x7f0000001240)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000001640)}}, {{0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000040)=[{0x10, 0x29, 0x3b}], 0x10}}], 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000001c0)='st\x00\xf9\xfd\xff\xff') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000000c0)={0x17, 0x14, &(0x7f0000000000)="089b99754c07881ae3d190ff603783ad854064b3"}) 02:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1228.434849] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1228.496170] Error parsing options; rc = [-22] 02:49:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xa], [], @loopback}}, r1}}, 0x48) 02:49:03 executing program 2: [ 1228.517598] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4}]) [ 1228.569489] Error parsing options; rc = [-22] 02:49:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711, @hyper}, 0x10) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) 02:49:03 executing program 2: 02:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) [ 1228.686194] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], @loopback}}, r1}}, 0x48) 02:49:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2}]) [ 1228.797389] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1228.828882] Error parsing options; rc = [-22] 02:49:04 executing program 2: [ 1228.859048] Error parsing options; rc = [-22] 02:49:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], @loopback}}, r1}}, 0x48) 02:49:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:04 executing program 2: 02:49:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:04 executing program 0: syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x200, 0x30000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='nv\x00', 0x3) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000140)={0x75e, 0x20, 0x8}) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_DQBUF(r0, 0xc0445611, &(0x7f0000000180)={0x0, 0xc, 0x4, 0x0, {0x77359400}, {0x7, 0x9, 0x9, 0x7fff, 0x64bdf5e, 0x2, "1295e2a4"}, 0xe4, 0x4, @offset=0x10001, 0x4}) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000000)={0x1000, 0x1ff, 0x6}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0xfffffd9a, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)=0x800) preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x100000000000000}]) [ 1229.071481] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1229.071497] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff000000], [], @loopback}}, r1}}, 0x48) 02:49:04 executing program 2: [ 1229.179705] QAT: Invalid ioctl [ 1229.186230] Error parsing options; rc = [-22] [ 1229.202559] QAT: Invalid ioctl 02:49:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:04 executing program 2: [ 1229.233070] QAT: Invalid ioctl [ 1229.239687] QAT: Invalid ioctl [ 1229.244488] Error parsing options; rc = [-22] 02:49:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x5000], [], @loopback}}, r1}}, 0x48) 02:49:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:04 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x1ffc, @reserved}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r0, 0x0, 0x8, &(0x7f0000000340)='selinux\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f00000003c0)='attr/current\x00') ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000280)="44d22824e000d67db1bdb0f56a56dbfc1e7ba897b8c0b24c21ad78429866dc5d767cb8edd2ea2407da") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x822}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r3, @ANYBLOB="00032dbd7000fcdbdf25050020001400020008000900020000000800040000000000080006000900000008000600050000004000010008000b0073697000080001000a0000000800020032000000080005000400000008000900220000000c000700040000000000000008000200000000001c00010008000600776c630008000500020000000800050001000000080004002c9300000800050008002000"], 0xa4}, 0x1, 0x0, 0x0, 0x40851}, 0x20000004) socket$rxrpc(0x21, 0x2, 0x2) preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x200000000000000}]) 02:49:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1229.369492] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1229.397151] Error parsing options; rc = [-22] 02:49:04 executing program 2: [ 1229.491170] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x1000000], [], @loopback}}, r1}}, 0x48) 02:49:04 executing program 2: [ 1229.530497] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1229.559304] Error parsing options; rc = [-22] [ 1229.564229] Error parsing options; rc = [-22] 02:49:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000}]) 02:49:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)={0x2, 0x14, 0x7, 0x6, 0x37, 0x0, 0x70bd27, 0x25dfdbfb, [@sadb_sa={0x2, 0x1, 0x4d4, 0x8, 0x20, 0x0, 0x1, 0x40000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbb, 0xf56a, {0x6, 0xff, 0x0, 0x0, 0x0, 0x80000000, 0x0, @in6, @in6=@ipv4={[], [], @broadcast}}}, @sadb_ident={0x2, 0xb, 0x800, 0x0, 0x101}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, 0x100000001}, @in6={0xa, 0x4e21, 0x300000000000000, @mcast1, 0xff}}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d6}, @sadb_sa={0x2, 0x1, 0x4d5, 0x7fffffff, 0x6, 0xc8, 0x1, 0x40000000}, @sadb_x_policy={0x8, 0x12, 0x1, 0x7, 0x0, 0x6e6bb2, 0x100000001, {0x6, 0x3c, 0x100000001, 0x100000000, 0x0, 0x9, 0x0, @in6=@remote, @in=@multicast1}}, @sadb_ident={0x2, 0xb, 0xe5, 0x0, 0x8}, @sadb_x_sec_ctx={0x13, 0x18, 0x7f, 0x5, 0x8e, "5ca5c1ba7c37ecfeec148a0c4c7a5d681d4fa942f34307f27fd9c9f59354aa606d1ad50e83fc413d1e845a1cf6df3edb457262885aa584b1ec502a9cc034543ee1f5cd6fdadab7a7ea4da10958a406659a010fe1c14f4130ed7578d2c9da14d68dfe4f5e1956e660e31579b873a989e8584a9e465fd17032be8e6c1e3fbcbbe05a423ad2f1b868cf197218048c65"}]}, 0x1b8}}, 0x4) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x3, 0x400) preadv(r2, &(0x7f0000000600)=[{&(0x7f0000000140)=""/74, 0x4a}, {&(0x7f00000006c0)=""/193, 0xc1}, {&(0x7f00000002c0)=""/179, 0xb3}, {&(0x7f0000000640)=""/66, 0x7}, {&(0x7f0000000400)=""/163, 0xa3}, {&(0x7f00000004c0)=""/236, 0xec}], 0x6, 0x20) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40186417, &(0x7f0000000240)={0x800, 0x8, 0x1, 0x0, 0x10, 0x5}) [ 1229.740535] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfec00000], [], @loopback}}, r1}}, 0x48) 02:49:05 executing program 2: [ 1229.787144] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1229.801486] Error parsing options; rc = [-22] [ 1229.862117] Error parsing options; rc = [-22] 02:49:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000}]) 02:49:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:05 executing program 2: 02:49:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3, 0x4000) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7ffffffff000}]) [ 1230.023230] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x900], [], @loopback}}, r1}}, 0x48) [ 1230.092952] Error parsing options; rc = [-22] 02:49:05 executing program 2: 02:49:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:05 executing program 2: [ 1230.195903] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1230.251643] Error parsing options; rc = [-22] 02:49:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x400000000000000}]) 02:49:05 executing program 2: [ 1230.298179] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xe], [], @loopback}}, r1}}, 0x48) [ 1230.415884] Error parsing options; rc = [-22] 02:49:05 executing program 2: 02:49:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="03f1b487f63430299c4b32cb1cd9ba16adebb0a79d7648066da8889c305dd5a22aa45cef7b3f25c9f701db17c33cbb372fb3189c6678cb24a3f3523b5fac329be9120f6b1cc908b53366b980808456e22203dd19861cd23e207e8e8319c0346f6daefdda7e52f6be8fa5169d4a0cff1ef8bfeb2cc3a1b3ed96dd51dae05166ac8af73e"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') write$binfmt_elf32(r0, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x9, 0x7fff, 0xd9b, 0xe5, 0x3, 0x3e, 0x7, 0x2b7, 0x38, 0x265, 0x200, 0x7f, 0x20, 0x2, 0x100000001, 0x2dec, 0x75be}, [{0x6, 0x1f, 0xfffffffffffffffb, 0x1a4, 0x4, 0x9, 0x7fff, 0x9}, {0x5, 0xbcee, 0x101, 0x5, 0x9, 0x0, 0x100, 0x8}], "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", [[], [], [], [], [], [], [], [], [], []]}, 0xb75) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:05 executing program 2: 02:49:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}]) 02:49:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x10000120], [], @loopback}}, r1}}, 0x48) 02:49:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1230.682601] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:06 executing program 2: 02:49:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x8000000000000000}]) [ 1230.794611] Error parsing options; rc = [-22] 02:49:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2001001000000000], [], @loopback}}, r1}}, 0x48) 02:49:06 executing program 2: 02:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:06 executing program 2: 02:49:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000}]) 02:49:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:06 executing program 2: [ 1231.149230] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1231.217630] Error parsing options; rc = [-22] 02:49:06 executing program 2: 02:49:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b6593ebd27ceacf78254e8bc44ebcfba8d9bf8ba2f84bc10c1625539c1aa330913974d899ab0a5740e21a6c25a2edcfedd0286b2a930354bb93b59830cd8aeab23ceb325e8bb31"], 0x1}}, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000005c0)='status\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0xfffffffffffffffc, 0x9, 0x5, 0x8, 0x40}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r2, 0x1, 0xffffffff837fcb48}, &(0x7f0000000280)=0xc) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000000)={0x3f, 0x5, 0x80000001, 0x200, 0x101, 0x1, 0x2}) 02:49:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x15c5000000000000], [], @loopback}}, r1}}, 0x48) 02:49:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 02:49:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:06 executing program 2: 02:49:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x5000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]) 02:49:06 executing program 2: 02:49:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], [], @loopback}}, r1}}, 0x48) 02:49:06 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000200)={0xf59, 0x3, 0x0, 0x6, 0x103, 0x59}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r1, 0xffff}, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[]}}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xfb1dc29f2f05dba2, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') 02:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:07 executing program 2: 02:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}]) 02:49:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000240)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x8b32}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0x7, @empty, 0xffffffffffffff76}}, 0x9, 0x800, 0x1, 0x100000, 0x8}, &(0x7f00000003c0)=0x98) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000280)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @local}], 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="94fa0486a0325fac2378dda9a7f9873b2b7cafd8ac83d1445023adcd3b912de7a6fd742cbc3b00a522398c3d7c2eb38bfcae88639b97c62b650782596835ee6dfc21d2a372ef0173aab7a32c8f4a1cf0e306545c3cff28f4389b195a1ea07eda0a72e27313df3bea7f2211f426ef52eef82b215b5b8e6c01ca25dd7f2cd27417e7dcf6c273fcd81c1fc47a19c1daf2459cfe5b5e3f051a6cf63995c5f2b29993dce4baa158b144684e3e97a27847bfa48f1b337281d07a619b048cf548486eb2447f954ff5b4beaf0777305fa19e9e88373d5dfe298abb7613e5e300525ff05279c247ddd6075826d1295a74c7bb6dad635fe2ae51bedb", 0xf7) r4 = syz_open_pts(r1, 0x0) readv(r4, &(0x7f0000000300), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="61d3552251d76f13a3814a9e2388979c9d008463cce7b78b2b95fb98e292a7199755680198d4ad5a16da5d00159713060aad23c3f202c1e2a21d8257f553ea4877d669b0f01d19af9fe94c"], 0x1}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r5, &(0x7f00000017c0), 0x11b, 0x0) 02:49:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x1000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:07 executing program 2: 02:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]) 02:49:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000700)=""/250, 0xfa) creat(0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) 02:49:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f0000000240)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x10100) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'bridge_slave_1\x00', {0x2, 0x4e20, @multicast1}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r2 = getpgid(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc0, &(0x7f00000002c0)=""/238, &(0x7f00000003c0)=0xee) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x1, 0x200000) 02:49:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x15c50000], [], @loopback}}, r1}}, 0x48) 02:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4}]) 02:49:07 executing program 2: 02:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc00], [], @loopback}}, r1}}, 0x48) 02:49:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:07 executing program 2: 02:49:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], @loopback}}, r1}}, 0x48) 02:49:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000}]) [ 1232.653026] Error parsing options; rc = [-22] 02:49:07 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x1011c0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="07f23bea89c2054151ebdec3d308cb0671578790f25681467930e5faa4ffda8b2cc6db9fabae0ac8dbb1a6e8b4bc99ea0091b9a1a2a73ae277350aacc6c1b62b47dbb83718e741d5d029f96c0bb2ef2222bfbf8523b4e61521d4705f16f0f64800216b15843bad378d6d686e8a997b55bbfcfff36018293bcb9d0dc449cfde0d300a611dd2f25c2a11fdd92b9fb4daa5a8df368c24"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/47, 0x2f) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:07 executing program 2: 02:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x10000000000000], [], @loopback}}, r1}}, 0x48) 02:49:08 executing program 2: [ 1232.893228] Error parsing options; rc = [-22] 02:49:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]) 02:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) fcntl$addseals(r0, 0x409, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x5, 0x401, 0x8, 0x7fffffff, 0xbf, 0x2b, 0x4, {0x0, @in6={{0xa, 0x4e21, 0x1f, @loopback, 0x9}}, 0x46cc, 0x7b, 0x1, 0x1000, 0x3f}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x49d19029}, 0x8) 02:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x7800000000000000], [], @loopback}}, r1}}, 0x48) 02:49:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}]) [ 1233.130068] Error parsing options; rc = [-22] [ 1233.229947] Error parsing options; rc = [-22] 02:49:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000000], [], @loopback}}, r1}}, 0x48) 02:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]) [ 1233.404385] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1233.438983] Error parsing options; rc = [-22] 02:49:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3f00], [], @loopback}}, r1}}, 0x48) [ 1233.451456] Error parsing options; rc = [-22] 02:49:08 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000240)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x8b32}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0x7, @empty, 0xffffffffffffff76}}, 0x9, 0x800, 0x1, 0x100000, 0x8}, &(0x7f00000003c0)=0x98) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000280)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @local}], 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="94fa0486a0325fac2378dda9a7f9873b2b7cafd8ac83d1445023adcd3b912de7a6fd742cbc3b00a522398c3d7c2eb38bfcae88639b97c62b650782596835ee6dfc21d2a372ef0173aab7a32c8f4a1cf0e306545c3cff28f4389b195a1ea07eda0a72e27313df3bea7f2211f426ef52eef82b215b5b8e6c01ca25dd7f2cd27417e7dcf6c273fcd81c1fc47a19c1daf2459cfe5b5e3f051a6cf63995c5f2b29993dce4baa158b144684e3e97a27847bfa48f1b337281d07a619b048cf548486eb2447f954ff5b4beaf0777305fa19e9e88373d5dfe298abb7613e5e300525ff05279c247ddd6075826d1295a74c7bb6dad635fe2ae51bedb", 0xf7) r4 = syz_open_pts(r1, 0x0) readv(r4, &(0x7f0000000300), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="61d3552251d76f13a3814a9e2388979c9d008463cce7b78b2b95fb98e292a7199755680198d4ad5a16da5d00159713060aad23c3f202c1e2a21d8257f553ea4877d669b0f01d19af9fe94c"], 0x1}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r5, &(0x7f00000017c0), 0x11b, 0x0) 02:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3f71eaa27b16f5d612ce78f169d06e2a5ba092b9a3da038769a6ec2a653f575158c4b7d19e4d4c0083979df5bec9a49eeb6fc771ecb1c4888b5541591621093cff9fe82d4f3c3395bc50afc34fd0db858b119e1ce56e358b93c9f0b770b955c67a768fea138581f300000000000000000000000000"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000180)=0x9) rt_sigtimedwait(&(0x7f0000000000)={0x12}, &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) 02:49:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]) 02:49:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc000000], [], @loopback}}, r1}}, 0x48) [ 1233.657351] Error parsing options; rc = [-22] [ 1233.663688] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1233.721292] Error parsing options; rc = [-22] 02:49:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]) 02:49:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:09 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000240)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x8b32}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0x7, @empty, 0xffffffffffffff76}}, 0x9, 0x800, 0x1, 0x100000, 0x8}, &(0x7f00000003c0)=0x98) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000280)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @local}], 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="94fa0486a0325fac2378dda9a7f9873b2b7cafd8ac83d1445023adcd3b912de7a6fd742cbc3b00a522398c3d7c2eb38bfcae88639b97c62b650782596835ee6dfc21d2a372ef0173aab7a32c8f4a1cf0e306545c3cff28f4389b195a1ea07eda0a72e27313df3bea7f2211f426ef52eef82b215b5b8e6c01ca25dd7f2cd27417e7dcf6c273fcd81c1fc47a19c1daf2459cfe5b5e3f051a6cf63995c5f2b29993dce4baa158b144684e3e97a27847bfa48f1b337281d07a619b048cf548486eb2447f954ff5b4beaf0777305fa19e9e88373d5dfe298abb7613e5e300525ff05279c247ddd6075826d1295a74c7bb6dad635fe2ae51bedb", 0xf7) r4 = syz_open_pts(r1, 0x0) readv(r4, &(0x7f0000000300), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="61d3552251d76f13a3814a9e2388979c9d008463cce7b78b2b95fb98e292a7199755680198d4ad5a16da5d00159713060aad23c3f202c1e2a21d8257f553ea4877d669b0f01d19af9fe94c"], 0x1}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r5, &(0x7f00000017c0), 0x11b, 0x0) 02:49:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3000000], [], @loopback}}, r1}}, 0x48) [ 1233.887954] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/199, 0xc7}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/41, 0x29}, {&(0x7f00000004c0)=""/40, 0x28}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f00000005c0)=""/238, 0xee}], 0x200000000000018d, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000440)=0x1e) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x180, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18000200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000014) [ 1233.946802] Error parsing options; rc = [-22] [ 1233.960219] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.006330] Error parsing options; rc = [-22] 02:49:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) io_destroy(r1) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x100000000, 0x80000) write$P9_RSTAT(r2, &(0x7f0000000140)={0x5c, 0x7d, 0x1, {0x0, 0x55, 0x5, 0x1, {0x0, 0x4, 0x1}, 0x0, 0x7fff, 0xe93b, 0x80, 0x6, 'system', 0xe, './cgroup/syz1\x00', 0xe, './cgroup/syz1\x00'}}, 0x5c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x9}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r4, 0x0, 0x6, 0x7f, 0x6, 0xf39d}, &(0x7f00000002c0)=0x14) r5 = dup(r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r5, 0xd, 0x2}, 0x10) 02:49:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2001001000000000], [], @loopback}}, r1}}, 0x48) 02:49:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x500], [], @loopback}}, r1}}, 0x48) 02:49:09 executing program 5: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:09 executing program 2: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:49:09 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) 02:49:09 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4a0080, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) syslog(0xa, &(0x7f0000000140)=""/175, 0xaf) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:09 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio\x00', 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xd85, 0x30, 0xffffffff, 0x2}, &(0x7f00000001c0)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={r1, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x10000, 0x0, 0xd3ab, 0x20, 0xe2b8, 0x5432a7da, 0x4, 0xff, 0x8, 0x3, 0xfffffffffffffff8, 0x0, 0x8, 0x7, 0x2]}, &(0x7f0000000540)=0x100) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xb, &(0x7f0000000400)=0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/199) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000140)=0x7) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0xfffffffffffffd14}]) [ 1234.317036] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.330018] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x10], [], @loopback}}, r1}}, 0x48) [ 1234.367211] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.394985] Error parsing options; rc = [-22] [ 1234.411561] Error parsing options; rc = [-22] [ 1234.419212] Error parsing options; rc = [-22] 02:49:09 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) 02:49:09 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 02:49:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2], [], @loopback}}, r1}}, 0x48) 02:49:09 executing program 2: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:49:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x479e, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000180)=0x2) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1fa, &(0x7f0000000440)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0xffffffffffffffcd, r1, &(0x7f0000000300)="b6f1dbf7", 0x4, 0x2241, 0x0, 0x2, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000380)="f8be13a3fe0c4401e6b6c0be68f418cb81fff3c596150be70e30f61c748d1c24226a600b3b5968ab6d405faba28800b05cc984e18f75636caa1e323217ad3ffb5be88c0936cc548008cb2f6f224de33a12744615eb1fc2a74a158a", 0x5b, 0x5, 0x0, 0x1, r1}]) ioctl$TIOCNOTTY(r1, 0x5422) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000240)) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) fcntl$addseals(r0, 0x409, 0x4) 02:49:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e9a92733b640320616cfba9d77d0f377cdc3574b5fe2ffb68138f285c8f69007b03431417477ec7d1b13cd9e0dc4615e73ac8273d36a868087cf52f78d94b2c178154472fe381429735db39d45cf90223482ecc7de3b80207379386c4cfd4fdf8fb88722124ae40717e3a7a4e38b8d101cc3b2e5cc2b3ac9fe7368dc87399be95e1bccc6547b387005b12618b28be150f6311207dc"], 0x1}}, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') [ 1234.631141] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.702159] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.723550] Error parsing options; rc = [-22] 02:49:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], [], @loopback}}, r1}}, 0x48) [ 1234.748346] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1234.770911] Error parsing options; rc = [-22] [ 1234.800616] Error parsing options; rc = [-22] 02:49:10 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) connect$bt_rfcomm(r0, &(0x7f0000000380)={0x1f, {0x1e89, 0x9, 0x2, 0x6, 0x0, 0xff}, 0x6}, 0xa) r2 = socket(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000140)=@llc={0x1a, 0x30f, 0xffff, 0x4346, 0xfffffffffffffffa, 0x7, @dev={[], 0x20}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="d46b1592676bf2bbaa33adb2fef409a1f8ee35d0185003efe882d5fa062c0f636880782c4adffbf169cb820fe4c19d2bee751172f986d9f7a30720cf0f65eadedce8770eb02c13b0f17931792c", 0x4d}], 0x1, &(0x7f0000003600)=[{0xc, 0x110}], 0xc, 0x4815}, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x33, 0x32, 0x10, 0x1b, 0x9, 0x820, 0x1, 0x126, 0x1}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10c1100}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="12002bbd7000ffdbdf25050000000c00060000000000000000000c00040008000000000000000c00050001000000000000000c00040008000000000000000c000304dcfa7339af58d18a2ef5460c8bcd620598d4ddaca2e35e51d19de165d10aec165d904d04440dd565d0d448cc532067988f00885ed402a60d8e9d8414849b1db6cdebcac5abcd8dbddb6e5f2abbd29b7df0860dfcff38ebff6aebdb6dd4443f75e9416739b2a9e5b95c5557c446770962fd076eb3af2f354b61bf"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg(r2, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x4b, &(0x7f000012e000)}, 0x0) recvmsg$kcm(r2, &(0x7f0000000d40)={&(0x7f0000000800)=@l2, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000880)=""/236, 0xec}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/92, 0x5c}, {&(0x7f0000000bc0)=""/5, 0x5}], 0x7, &(0x7f0000000cc0)=""/71, 0x47}, 0x40000100) 02:49:10 executing program 3: inotify_init() r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0xcd7bdf7d87479902, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0x8, 0x4) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) 02:49:10 executing program 2: syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:49:10 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1235.060111] FAULT_INJECTION: forcing a failure. [ 1235.060111] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.063585] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1235.073650] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1235.104091] CPU: 0 PID: 8370 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1235.110873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.120246] Call Trace: [ 1235.122851] dump_stack+0x1db/0x2d0 [ 1235.126503] ? dump_stack_print_info.cold+0x20/0x20 [ 1235.131577] ? proc_fail_nth_write+0xa0/0x220 [ 1235.136099] should_fail.cold+0xa/0x15 [ 1235.140006] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1235.145147] ? ___might_sleep+0x1e7/0x310 [ 1235.149308] ? arch_local_save_flags+0x50/0x50 [ 1235.150621] Error parsing options; rc = [-22] [ 1235.153931] __should_failslab+0x121/0x190 [ 1235.153953] should_failslab+0x9/0x14 [ 1235.153969] __kmalloc_track_caller+0x2d8/0x740 [ 1235.153988] ? strncpy_from_user+0x440/0x440 [ 1235.154005] ? strndup_user+0x77/0xd0 [ 1235.154023] memdup_user+0x26/0xb0 [ 1235.160719] Error parsing options; rc = [-22] [ 1235.162752] strndup_user+0x77/0xd0 [ 1235.162774] copy_mount_string+0x2a/0x40 [ 1235.162792] __ia32_compat_sys_mount+0xcf/0x790 [ 1235.162818] do_fast_syscall_32+0x333/0xf98 [ 1235.162839] ? do_int80_syscall_32+0x880/0x880 02:49:10 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1235.162856] ? trace_hardirqs_off+0x310/0x310 [ 1235.213211] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1235.218167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.223716] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1235.228752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1235.233613] entry_SYSENTER_compat+0x70/0x7f [ 1235.238029] RIP: 0023:0xf7f86869 [ 1235.241407] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 02:49:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3f000000], [], @loopback}}, r1}}, 0x48) [ 1235.260782] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1235.268498] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1235.268508] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1235.268517] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1235.268527] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1235.268536] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1235.287817] FAULT_INJECTION: forcing a failure. [ 1235.287817] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.311084] CPU: 0 PID: 8380 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1235.323509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.332862] Call Trace: [ 1235.335472] dump_stack+0x1db/0x2d0 [ 1235.339115] ? dump_stack_print_info.cold+0x20/0x20 [ 1235.344156] should_fail.cold+0xa/0x15 [ 1235.348061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1235.353183] ? ___might_sleep+0x1e7/0x310 [ 1235.353202] ? arch_local_save_flags+0x50/0x50 [ 1235.353222] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1235.353248] __should_failslab+0x121/0x190 [ 1235.370949] should_failslab+0x9/0x14 [ 1235.370967] __kmalloc_track_caller+0x2d8/0x740 [ 1235.370987] ? strncpy_from_user+0x440/0x440 [ 1235.371007] ? strndup_user+0x77/0xd0 [ 1235.387839] memdup_user+0x26/0xb0 [ 1235.391396] strndup_user+0x77/0xd0 [ 1235.395043] copy_mount_string+0x2a/0x40 [ 1235.399115] __ia32_compat_sys_mount+0xcf/0x790 [ 1235.403801] ? do_fast_syscall_32+0x16d/0xf98 02:49:10 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1235.408314] do_fast_syscall_32+0x333/0xf98 [ 1235.412650] ? do_int80_syscall_32+0x880/0x880 [ 1235.417239] ? trace_hardirqs_off+0x310/0x310 [ 1235.421744] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1235.426687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.432235] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1235.437268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1235.442132] entry_SYSENTER_compat+0x70/0x7f [ 1235.446549] RIP: 0023:0xf7f80869 [ 1235.449945] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1235.468852] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1235.468867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1235.468876] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1235.468885] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1235.468903] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 02:49:10 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000100)=0xfff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0)={0x3, "3d8c58"}, 0x4) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)) 02:49:10 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1235.468912] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x184, r2, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2e55}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100000000000}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1c}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffff283e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xad23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8000}, 0x24000080) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1235.609774] FAULT_INJECTION: forcing a failure. [ 1235.609774] name failslab, interval 1, probability 0, space 0, times 0 02:49:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) [ 1235.651828] FAULT_INJECTION: forcing a failure. [ 1235.651828] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.677377] CPU: 1 PID: 8393 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1235.684168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.693533] Call Trace: [ 1235.696177] dump_stack+0x1db/0x2d0 [ 1235.699858] ? dump_stack_print_info.cold+0x20/0x20 [ 1235.704918] ? should_fail.cold+0x5/0x15 [ 1235.709007] should_fail.cold+0xa/0x15 [ 1235.712924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1235.718058] ? ___might_sleep+0x1e7/0x310 [ 1235.722222] ? arch_local_save_flags+0x50/0x50 [ 1235.726839] __should_failslab+0x121/0x190 [ 1235.731095] should_failslab+0x9/0x14 [ 1235.734924] kmem_cache_alloc_trace+0x2d1/0x760 [ 1235.739610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1235.745162] ? _copy_from_user+0xdd/0x150 [ 1235.749341] copy_mount_options+0x5c/0x440 [ 1235.753611] __ia32_compat_sys_mount+0x127/0x790 [ 1235.758401] do_fast_syscall_32+0x333/0xf98 [ 1235.762751] ? do_int80_syscall_32+0x880/0x880 [ 1235.767349] ? trace_hardirqs_off+0x310/0x310 [ 1235.771865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.777438] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1235.782475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1235.787372] entry_SYSENTER_compat+0x70/0x7f [ 1235.791791] RIP: 0023:0xf7f86869 [ 1235.795173] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1235.814091] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1235.821810] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1235.829092] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1235.836369] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1235.843641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1235.850918] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1235.859017] CPU: 0 PID: 8399 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1235.865798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.875171] Call Trace: [ 1235.877772] dump_stack+0x1db/0x2d0 [ 1235.881414] ? dump_stack_print_info.cold+0x20/0x20 [ 1235.886446] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1235.891035] ? retint_kernel+0x2d/0x2d [ 1235.894942] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1235.899886] should_fail.cold+0xa/0x15 [ 1235.903803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1235.908956] ? ___might_sleep+0x1e7/0x310 [ 1235.913117] ? arch_local_save_flags+0x50/0x50 [ 1235.917727] __should_failslab+0x121/0x190 [ 1235.921976] should_failslab+0x9/0x14 [ 1235.925786] kmem_cache_alloc_trace+0x2d1/0x760 [ 1235.930463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1235.936009] ? _copy_from_user+0xdd/0x150 [ 1235.940184] copy_mount_options+0x5c/0x440 [ 1235.944436] __ia32_compat_sys_mount+0x127/0x790 [ 1235.949229] do_fast_syscall_32+0x333/0xf98 [ 1235.953568] ? do_int80_syscall_32+0x880/0x880 [ 1235.958161] ? trace_hardirqs_off+0x310/0x310 [ 1235.962664] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1235.967605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.973154] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1235.978186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1235.983050] entry_SYSENTER_compat+0x70/0x7f [ 1235.987462] RIP: 0023:0xf7f80869 [ 1235.990838] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1236.009745] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1236.017457] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1236.024731] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1236.032005] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1236.039279] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1236.046553] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x300], [], @loopback}}, r1}}, 0x48) 02:49:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) 02:49:11 executing program 2 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:11 executing program 5 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:11 executing program 3: io_setup(0x7, &(0x7f00000001c0)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xffffffffffffffe0, 0x20040) io_submit(r0, 0x4000000000000197, &(0x7f0000000880)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x0, r2, &(0x7f0000000100)="fff508a195dd7a0dbd961bd29f77bd59370ded6583b92fc05c33268e0fa01e6be70ed490a4bd45c6cf43bf8d2ca0108371141bfe20033b", 0x0, 0x7ff, 0x0, 0x1, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x98, r3, &(0x7f0000000200)="9c37614e41c1a6f3a111cf4b852f9e827f518f04512bf82e5e677987bb10b21694b3068825aba9b4acadb0fd9e36853f8af8cb15812c673277c940b36ec6f1bf117fdfeea8646472f312737cafc90493019e337f6e2d6971eca638d52f4ba3eacb430323120c18c0a6614c040e93ef2861e09f1edf8326930bc58bae6a1fb9f99f8d50fd3da3c00dd5f0169e56", 0x0, 0x8, 0x0, 0x1, r3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x2, r3, &(0x7f0000000300)="9b907656a2ae57aab33997c0bcd65fc19e5b02d789e57977cd31419b6d17ea205a6727fa55614990c0016a8957d9a55a34367372c866b922db9b847dca91610dcdcaf264eacc41602d6490aab4d8e1ce7585fdff688dcc26af158b453adf8daaa29ef41f11892d1e689c6c319d4dd9c4051dc364194138a11795f6ceaaa1c511a23fbe8feaac7f046cbc49c9328284e1e60312d2872577b3a098b60228daca554910d8e7f12dbb037d7ed6", 0x0, 0xbf, 0x0, 0x0, r3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x6, r3, &(0x7f0000000400)="afe7cf068673ba5271b085843ddb403993e998a9f54ef3728dddbb569570702459b1fb9a0d00b9cec270619887f0990141b8b47f8807dfc6473ff78915b3766ad331340c6b1d80d872780fc138e39980810dd429d593a8088c48dfc34447f251174c709b3bc55d3b28965360211c5291b4acc2ded8567ff96d0a", 0x0, 0x7fff, 0x0, 0x2, r3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x9, r3, &(0x7f00000004c0)="195b9bfd35e23126f69c6c451afd9a19cb844aef696d37df9fb5ce2eec0d814d9c6edc0050288af29d28b5d359946d592136f80bef4e2bfb5db7fab9e4caf3f729fde20ae9e88d02455b8027d7647129a9c07ddf362b926e4d1649a0b5df2502b0dfc522a58215ba640e9494769a5c029016e25d2f2e2fc8d83291449bd68fac1e63061e5e3582db11c5791ee164bf767a5ba505a6fc09", 0x0, 0xbf, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xf, 0x9, r3, &(0x7f00000005c0)="2f5f44fe1a549e7538307e29989918d95cc6477789a9e3ee7348b417cf9c980d6b71af67ac4bb7d9c09978681d49fe8769fe78720aad3507891b4ab09e6143cadba56d3d08701776f8b7540c17c2cffe302b37d7671ff1b4465874f7dbfaf7ff0c6c17a06d6a9d86b66ab104ecdeb21764c398283075cf9875645af2f7a21373c2f1f0abbf035058d65efeba2e04c3fd5339f73dbee55f498e7ecbd9f7726708e9511acf6c0a96b31c9f50b653631bd3563d1c9c6b7ee50ce77d72db75e4e3e6099c57f205252a8a4445fdc8a2b8211cbe18db48dd9f4d8e64091230004a0a3030bda853c5", 0x0, 0x3ff, 0x0, 0x0, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x1, r2, &(0x7f0000000700)="0a8649cfc29f9a084c1cab3510ecdcf3f7dfbfae0124a5fbacead09b491e9c163706800a72428de3c13b27a5ac57eea2dce2d3c15d4752e7c152472b8eab970f599879b3c362b48f91fa11f8de59ccdf8e1cd7113aa424e215382c7e8fd1903613c4b85875f31b89da017d8323d9bb44545e68b7badb39c17cc8ed2d8331123980162adddd37ae71cbe4536001ffba621cb903250816ebd25cca25f9b6de4c86d3f663f5dc6cfbe726972774f5a74a3a1047b73cb12594", 0x0, 0x80, 0x0, 0x1, r3}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x7, r2, &(0x7f0000000800)="c1ada87048ba769343968318815b320f120b33f3bd330203d4ed3d76460d3559beb0dbe170fc3a4d08da954166f47ca14e095776", 0x0, 0x9, 0x0, 0x1, r3}]) 02:49:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) pwritev(r0, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc], [], @loopback}}, r1}}, 0x48) [ 1236.303680] FAULT_INJECTION: forcing a failure. [ 1236.303680] name failslab, interval 1, probability 0, space 0, times 0 02:49:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) [ 1236.377918] FAULT_INJECTION: forcing a failure. [ 1236.377918] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.399337] CPU: 0 PID: 8426 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1236.406118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.415486] Call Trace: [ 1236.418098] dump_stack+0x1db/0x2d0 [ 1236.421743] ? dump_stack_print_info.cold+0x20/0x20 02:49:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) [ 1236.426788] ? retint_kernel+0x2d/0x2d [ 1236.430729] should_fail.cold+0xa/0x15 [ 1236.434636] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1236.439761] ? ___might_sleep+0x1e7/0x310 [ 1236.443934] ? arch_local_save_flags+0x50/0x50 [ 1236.448530] ? __switch_to_asm+0x34/0x70 [ 1236.452598] ? __switch_to_asm+0x40/0x70 [ 1236.456678] ? __switch_to_asm+0x34/0x70 [ 1236.460760] ? __switch_to_asm+0x40/0x70 [ 1236.464843] __should_failslab+0x121/0x190 [ 1236.469100] should_failslab+0x9/0x14 [ 1236.472943] kmem_cache_alloc+0x2be/0x710 [ 1236.477118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1236.481909] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1236.486505] ? retint_kernel+0x2d/0x2d [ 1236.486527] getname_flags+0xd6/0x5b0 [ 1236.486543] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1236.486562] user_path_at_empty+0x2f/0x50 [ 1236.486582] do_mount+0x169/0x3110 [ 1236.486598] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1236.486618] ? copy_mount_string+0x40/0x40 [ 1236.516395] ? copy_mount_options+0x250/0x440 [ 1236.520915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.526466] ? copy_mount_options+0x30e/0x440 [ 1236.530977] __ia32_compat_sys_mount+0x664/0x790 [ 1236.535760] do_fast_syscall_32+0x333/0xf98 [ 1236.540110] ? do_int80_syscall_32+0x880/0x880 [ 1236.544715] ? trace_hardirqs_off+0x310/0x310 [ 1236.549225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.554775] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1236.559822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.564690] entry_SYSENTER_compat+0x70/0x7f [ 1236.569112] RIP: 0023:0xf7f86869 [ 1236.572492] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1236.591405] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1236.599121] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1236.606394] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1236.613677] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1236.620949] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1236.628223] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1236.639234] CPU: 1 PID: 8435 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1236.646018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.655385] Call Trace: [ 1236.658005] dump_stack+0x1db/0x2d0 [ 1236.661671] ? dump_stack_print_info.cold+0x20/0x20 [ 1236.666717] ? kernel_text_address+0x73/0xf0 [ 1236.671156] should_fail.cold+0xa/0x15 [ 1236.675071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1236.680206] ? ___might_sleep+0x1e7/0x310 [ 1236.684376] ? arch_local_save_flags+0x50/0x50 [ 1236.688990] ? copy_mount_options+0x5c/0x440 [ 1236.693405] ? __ia32_compat_sys_mount+0x127/0x790 [ 1236.698347] ? do_fast_syscall_32+0x333/0xf98 [ 1236.702849] ? add_lock_to_list.isra.0+0x450/0x450 [ 1236.707798] __should_failslab+0x121/0x190 [ 1236.712048] should_failslab+0x9/0x14 [ 1236.715855] kmem_cache_alloc+0x2be/0x710 [ 1236.720013] ? find_held_lock+0x35/0x120 [ 1236.724080] ? kmem_cache_alloc_trace+0x5a4/0x760 [ 1236.728941] getname_flags+0xd6/0x5b0 [ 1236.732753] ? check_preemption_disabled+0x48/0x290 [ 1236.737782] user_path_at_empty+0x2f/0x50 [ 1236.741948] do_mount+0x169/0x3110 [ 1236.745502] ? copy_mount_options+0x5c/0x440 [ 1236.749930] ? copy_mount_string+0x40/0x40 [ 1236.754177] ? rcu_read_lock_sched_held+0x110/0x130 [ 1236.759205] ? kmem_cache_alloc_trace+0x354/0x760 [ 1236.764073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.769647] ? copy_mount_options+0x30e/0x440 [ 1236.774163] __ia32_compat_sys_mount+0x664/0x790 [ 1236.778946] do_fast_syscall_32+0x333/0xf98 [ 1236.783283] ? do_int80_syscall_32+0x880/0x880 [ 1236.787871] ? trace_hardirqs_off+0x310/0x310 [ 1236.792385] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1236.797334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1236.802882] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1236.807929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.812791] entry_SYSENTER_compat+0x70/0x7f [ 1236.817204] RIP: 0023:0xf7f80869 [ 1236.820579] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1236.839491] RSP: 002b:00000000f5f5b0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1236.847210] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1236.854483] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1236.861754] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1236.869026] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 02:49:12 executing program 5 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1236.876304] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:12 executing program 2 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:12 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1237.024858] FAULT_INJECTION: forcing a failure. [ 1237.024858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1237.036764] CPU: 1 PID: 8456 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1237.043537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.052904] Call Trace: [ 1237.055523] dump_stack+0x1db/0x2d0 [ 1237.059180] ? dump_stack_print_info.cold+0x20/0x20 [ 1237.064216] ? debug_smp_processor_id+0x1c/0x20 [ 1237.068920] ? perf_trace_lock+0x12f/0x750 [ 1237.073186] should_fail.cold+0xa/0x15 [ 1237.077094] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1237.082213] ? retint_kernel+0x2d/0x2d [ 1237.086125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.090910] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1237.096388] ? debug_smp_processor_id+0x1c/0x20 [ 1237.101096] should_fail_alloc_page+0x50/0x60 [ 1237.102774] FAULT_INJECTION: forcing a failure. [ 1237.102774] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.105603] __alloc_pages_nodemask+0x323/0xdc0 [ 1237.105621] ? retint_kernel+0x2d/0x2d [ 1237.105644] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1237.105665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.105698] ? ___might_sleep+0x1e7/0x310 [ 1237.105718] ? trace_hardirqs_off+0xb8/0x310 [ 1237.105740] cache_grow_begin+0x9c/0x8c0 [ 1237.105762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1237.154184] ? check_preemption_disabled+0x48/0x290 [ 1237.159227] kmem_cache_alloc+0x645/0x710 [ 1237.163392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.168177] getname_flags+0xd6/0x5b0 [ 1237.171993] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1237.177471] user_path_at_empty+0x2f/0x50 [ 1237.181637] do_mount+0x169/0x3110 [ 1237.185189] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.189968] ? copy_mount_string+0x40/0x40 [ 1237.194225] ? copy_mount_options+0x234/0x440 [ 1237.198733] ? copy_mount_options+0x23a/0x440 [ 1237.203246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.208794] ? copy_mount_options+0x30e/0x440 [ 1237.213308] __ia32_compat_sys_mount+0x664/0x790 [ 1237.218087] do_fast_syscall_32+0x333/0xf98 [ 1237.222457] ? do_int80_syscall_32+0x880/0x880 [ 1237.227048] ? trace_hardirqs_off+0x310/0x310 [ 1237.231563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.237116] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1237.242154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.247162] entry_SYSENTER_compat+0x70/0x7f [ 1237.251585] RIP: 0023:0xf7f86869 [ 1237.254981] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1237.273887] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1237.281638] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1237.288921] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1237.296198] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1237.303479] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.310757] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1237.318072] CPU: 0 PID: 8464 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1237.324845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.334205] Call Trace: [ 1237.336805] dump_stack+0x1db/0x2d0 [ 1237.340449] ? dump_stack_print_info.cold+0x20/0x20 [ 1237.345488] should_fail.cold+0xa/0x15 [ 1237.349388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1237.354508] ? ___might_sleep+0x1e7/0x310 [ 1237.358665] ? arch_local_save_flags+0x50/0x50 [ 1237.363256] ? __switch_to_asm+0x34/0x70 [ 1237.367326] ? __switch_to_asm+0x40/0x70 [ 1237.371412] __should_failslab+0x121/0x190 [ 1237.375659] should_failslab+0x9/0x14 [ 1237.379468] kmem_cache_alloc+0x2be/0x710 [ 1237.383627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.388392] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1237.392981] ? retint_kernel+0x2d/0x2d [ 1237.396881] getname_flags+0xd6/0x5b0 [ 1237.400698] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1237.406167] user_path_at_empty+0x2f/0x50 [ 1237.410329] do_mount+0x169/0x3110 [ 1237.413875] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.418658] ? copy_mount_string+0x40/0x40 [ 1237.422924] ? copy_mount_options+0x223/0x440 [ 1237.427435] ? copy_mount_options+0x22a/0x440 [ 1237.431949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.437498] ? copy_mount_options+0x30e/0x440 [ 1237.442012] __ia32_compat_sys_mount+0x664/0x790 [ 1237.446790] do_fast_syscall_32+0x333/0xf98 [ 1237.451125] ? do_int80_syscall_32+0x880/0x880 [ 1237.455722] ? trace_hardirqs_off+0x310/0x310 [ 1237.460240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.465790] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1237.470823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.475688] entry_SYSENTER_compat+0x70/0x7f [ 1237.480102] RIP: 0023:0xf7f80869 [ 1237.483477] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1237.502383] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1237.510100] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1237.517375] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 02:49:12 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x184, r2, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2e55}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100000000000}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1c}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffff283e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xad23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8000}, 0x24000080) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1237.524646] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1237.531929] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.539203] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x48000000], [], @loopback}}, r1}}, 0x48) 02:49:12 executing program 5 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1237.628258] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1237.658060] Error parsing options; rc = [-22] 02:49:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="688d4866352b1205000000377b1477e2643791b01eb1d415721bcd0c5b5614f19560cc7dfaad9d5f9681cbc84541d3e56cec5ac5e5f610a1403c770971ef4e413fa9521c3d16b96f5a930874b9445dfadde8dc66c75557e77ac67e24ad6fb0adcd299dad122f5f940dad24e800ec86183337ac7b4485d618795f43ba24dc83f45b"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/145, 0x91}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/61, 0x3d}, {&(0x7f0000000480)=""/165, 0xa5}], 0x7, 0x0) 02:49:13 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 02:49:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4800], [], @loopback}}, r1}}, 0x48) 02:49:13 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1237.838661] FAULT_INJECTION: forcing a failure. [ 1237.838661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1237.850522] CPU: 0 PID: 8485 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1237.857283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.866641] Call Trace: [ 1237.869246] dump_stack+0x1db/0x2d0 [ 1237.872905] ? dump_stack_print_info.cold+0x20/0x20 [ 1237.877962] ? debug_smp_processor_id+0x1c/0x20 [ 1237.882664] should_fail.cold+0xa/0x15 [ 1237.886569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1237.891681] ? check_preemption_disabled+0x48/0x290 [ 1237.896713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.902258] ? check_preemption_disabled+0x48/0x290 [ 1237.907280] ? finish_task_switch+0x1e9/0xac0 [ 1237.911791] ? debug_smp_processor_id+0x1c/0x20 [ 1237.916471] ? perf_trace_lock+0x12f/0x750 [ 1237.920731] should_fail_alloc_page+0x50/0x60 [ 1237.925235] __alloc_pages_nodemask+0x323/0xdc0 [ 1237.929930] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1237.934554] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1237.939578] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1237.945056] ? ___might_sleep+0x1e7/0x310 [ 1237.949218] ? trace_hardirqs_off+0xb8/0x310 [ 1237.953645] cache_grow_begin+0x9c/0x8c0 [ 1237.957716] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1237.963262] ? check_preemption_disabled+0x48/0x290 [ 1237.968296] kmem_cache_alloc+0x645/0x710 [ 1237.972467] getname_flags+0xd6/0x5b0 [ 1237.976277] ? retint_kernel+0x2d/0x2d [ 1237.980178] user_path_at_empty+0x2f/0x50 [ 1237.984372] do_mount+0x169/0x3110 [ 1237.987945] ? copy_mount_string+0x40/0x40 [ 1237.992198] ? retint_kernel+0x2d/0x2d [ 1237.996119] __ia32_compat_sys_mount+0x664/0x790 [ 1238.000884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.006454] do_fast_syscall_32+0x333/0xf98 [ 1238.010793] ? do_int80_syscall_32+0x880/0x880 [ 1238.015377] ? trace_hardirqs_off+0x310/0x310 [ 1238.019889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.025454] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1238.030499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.035361] entry_SYSENTER_compat+0x70/0x7f [ 1238.039774] RIP: 0023:0xf7f86869 [ 1238.043149] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1238.062073] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1238.069788] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1238.077061] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 02:49:13 executing program 2 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1238.084334] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1238.091610] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1238.098884] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1238.170751] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1238.187478] FAULT_INJECTION: forcing a failure. [ 1238.187478] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.199260] Error parsing options; rc = [-22] [ 1238.200125] CPU: 1 PID: 8500 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1238.210528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.219905] Call Trace: [ 1238.222518] dump_stack+0x1db/0x2d0 [ 1238.226163] ? dump_stack_print_info.cold+0x20/0x20 [ 1238.231190] ? error_exit+0xb/0x20 [ 1238.234745] ? fs_reclaim_acquire+0x20/0x20 [ 1238.239086] should_fail.cold+0xa/0x15 [ 1238.242988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1238.248111] ? ___might_sleep+0x1e7/0x310 [ 1238.252270] ? arch_local_save_flags+0x50/0x50 [ 1238.256882] __should_failslab+0x121/0x190 [ 1238.261141] should_failslab+0x9/0x14 [ 1238.264949] kmem_cache_alloc+0x2be/0x710 [ 1238.269113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.273968] alloc_vfsmnt+0xb8/0x990 [ 1238.277690] ? m_stop+0x20/0x20 [ 1238.281326] ? __get_fs_type+0x9a/0xd0 [ 1238.285225] ? __get_fs_type+0x9a/0xd0 [ 1238.289124] ? find_held_lock+0x35/0x120 [ 1238.293192] ? __get_fs_type+0x9a/0xd0 [ 1238.297088] ? lock_acquire+0x1db/0x570 [ 1238.301074] ? lock_downgrade+0x910/0x910 [ 1238.305228] ? lock_release+0xc40/0xc40 [ 1238.309235] ? apparmor_cred_prepare+0x5b0/0x5b0 [ 1238.314004] vfs_kern_mount.part.0+0x84/0x570 [ 1238.318514] ? may_umount+0xb0/0xb0 [ 1238.322165] ? _raw_read_unlock+0x2d/0x50 [ 1238.326327] ? __get_fs_type+0x9a/0xd0 [ 1238.330233] do_mount+0x576/0x3110 [ 1238.333790] ? copy_mount_string+0x40/0x40 [ 1238.338041] ? retint_kernel+0x2d/0x2d [ 1238.341954] ? __ia32_compat_sys_mount+0x182/0x790 [ 1238.346911] __ia32_compat_sys_mount+0x664/0x790 [ 1238.351687] do_fast_syscall_32+0x333/0xf98 [ 1238.356023] ? do_int80_syscall_32+0x880/0x880 [ 1238.360615] ? trace_hardirqs_off+0x310/0x310 [ 1238.365118] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1238.370074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.375618] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1238.381108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.385969] entry_SYSENTER_compat+0x70/0x7f [ 1238.390384] RIP: 0023:0xf7f80869 [ 1238.393762] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1238.412675] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1238.420390] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1238.427672] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1238.434946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1238.442219] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1238.449497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:13 executing program 2 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:13 executing program 5 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xa000000], [], @loopback}}, r1}}, 0x48) 02:49:13 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x1f, 0x4) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:13 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1238.643016] FAULT_INJECTION: forcing a failure. [ 1238.643016] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.662563] FAULT_INJECTION: forcing a failure. [ 1238.662563] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1238.698778] CPU: 1 PID: 8511 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1238.705566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.714936] Call Trace: [ 1238.717573] dump_stack+0x1db/0x2d0 [ 1238.721220] ? dump_stack_print_info.cold+0x20/0x20 [ 1238.726263] should_fail.cold+0xa/0x15 [ 1238.730210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1238.735331] ? arch_local_save_flags+0x50/0x50 [ 1238.739939] ? lock_release+0xc40/0xc40 [ 1238.743929] ? pcpu_balance_workfn+0x1680/0x1680 [ 1238.743962] should_fail_alloc_page+0x50/0x60 [ 1238.743977] __alloc_pages_nodemask+0x323/0xdc0 [ 1238.743993] ? init_wait_entry+0x1c0/0x1c0 [ 1238.762151] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1238.767182] ? alloc_vfsmnt+0x735/0x990 [ 1238.771175] ? __get_fs_type+0x9a/0xd0 [ 1238.775081] ? find_held_lock+0x35/0x120 [ 1238.779159] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1238.784730] alloc_pages_current+0x107/0x210 [ 1238.789159] get_zeroed_page+0x14/0x50 [ 1238.793057] mount_fs+0x210/0x331 [ 1238.796518] ? strncmp+0x53/0xd0 [ 1238.799913] vfs_kern_mount.part.0+0xdb/0x570 [ 1238.804434] ? may_umount+0xb0/0xb0 [ 1238.808072] ? _raw_read_unlock+0x2d/0x50 [ 1238.812233] ? __get_fs_type+0x9a/0xd0 [ 1238.816144] do_mount+0x576/0x3110 [ 1238.819707] ? copy_mount_string+0x40/0x40 [ 1238.823979] ? copy_mount_options+0x255/0x440 [ 1238.828486] ? copy_mount_options+0x1de/0x440 [ 1238.833004] ? __sanitizer_cov_trace_pc+0x8/0x50 [ 1238.837775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.843318] ? copy_mount_options+0x30e/0x440 [ 1238.847832] __ia32_compat_sys_mount+0x664/0x790 [ 1238.852606] do_fast_syscall_32+0x333/0xf98 [ 1238.856950] ? do_int80_syscall_32+0x880/0x880 [ 1238.861537] ? trace_hardirqs_off+0x310/0x310 [ 1238.866043] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1238.870983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1238.876531] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1238.881562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.886433] entry_SYSENTER_compat+0x70/0x7f [ 1238.890850] RIP: 0023:0xf7f80869 [ 1238.894223] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1238.913130] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1238.920845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1238.928120] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1238.935391] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1238.942754] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 02:49:13 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xbbc, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="7112b6dcbb15f4f2ef99c5b29c89d7c6636fef2734c2d91e79afe0fec140ff7d50e193800ebf16c98ced6c9f6e926973389055183ba4bca6807669d879831eb720f9ebff1be31ef59d04d3ec213c9f38718d3e0d10a7160c97a1813af17079d8c437324d"], 0x1}}, 0x0) rt_sigpending(&(0x7f0000000180), 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) [ 1238.950026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1238.959194] CPU: 0 PID: 8514 Comm: syz-executor5 Not tainted 4.20.0+ #2 [ 1238.965988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.975348] Call Trace: [ 1238.977968] dump_stack+0x1db/0x2d0 [ 1238.981624] ? dump_stack_print_info.cold+0x20/0x20 [ 1238.986659] ? save_stack+0x45/0xd0 [ 1238.990303] ? __kasan_slab_free+0x102/0x150 [ 1238.994727] ? kasan_slab_free+0xe/0x10 [ 1238.998720] ? putname+0xef/0x130 [ 1239.002198] should_fail.cold+0xa/0x15 [ 1239.006116] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1239.011248] ? ___might_sleep+0x1e7/0x310 [ 1239.015410] ? arch_local_save_flags+0x50/0x50 [ 1239.020010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1239.024786] __should_failslab+0x121/0x190 [ 1239.029035] should_failslab+0x9/0x14 [ 1239.032848] kmem_cache_alloc+0x2be/0x710 [ 1239.037017] ? vfs_kern_mount.part.0+0x7c/0x570 [ 1239.041700] alloc_vfsmnt+0xb8/0x990 [ 1239.045421] ? m_stop+0x20/0x20 [ 1239.048715] ? __get_fs_type+0x9a/0xd0 [ 1239.052611] ? find_held_lock+0x35/0x120 [ 1239.056681] ? __get_fs_type+0x9a/0xd0 [ 1239.060590] ? lock_downgrade+0x910/0x910 [ 1239.064753] ? strncmp+0x60/0xd0 [ 1239.068134] vfs_kern_mount.part.0+0x84/0x570 [ 1239.072648] ? may_umount+0xb0/0xb0 [ 1239.076283] ? _raw_read_unlock+0x2d/0x50 [ 1239.080435] ? __get_fs_type+0x9a/0xd0 [ 1239.084339] do_mount+0x576/0x3110 [ 1239.087889] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1239.092697] ? copy_mount_string+0x40/0x40 [ 1239.096959] ? copy_mount_options+0x223/0x440 [ 1239.101468] ? copy_mount_options+0x22c/0x440 [ 1239.105977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.111547] ? copy_mount_options+0x30e/0x440 [ 1239.116060] __ia32_compat_sys_mount+0x664/0x790 [ 1239.120840] do_fast_syscall_32+0x333/0xf98 [ 1239.125177] ? do_int80_syscall_32+0x880/0x880 [ 1239.129766] ? trace_hardirqs_off+0x310/0x310 [ 1239.134271] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1239.139222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.144767] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1239.149801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.154660] entry_SYSENTER_compat+0x70/0x7f [ 1239.159096] RIP: 0023:0xf7f86869 [ 1239.162471] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1239.181377] RSP: 002b:00000000f5f820cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1239.189091] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 02:49:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], @loopback}}, r1}}, 0x48) [ 1239.196364] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1239.203634] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1239.210917] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1239.218197] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:14 executing program 2 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:14 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x1006, &(0x7f00000001c0)=0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x200, r3, 0x6, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x71d}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @local, 0x4a5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x100000000, @empty, 0xf64}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8cea}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x685}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffff9, @empty, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x2cf6}}}}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x93}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}]}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x40040c0}, 0x4) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x6], [], @loopback}}, r1}}, 0x48) [ 1239.347445] FAULT_INJECTION: forcing a failure. [ 1239.347445] name failslab, interval 1, probability 0, space 0, times 0 02:49:14 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1239.423133] CPU: 0 PID: 8540 Comm: syz-executor2 Not tainted 4.20.0+ #2 [ 1239.429948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.439309] Call Trace: [ 1239.441945] dump_stack+0x1db/0x2d0 [ 1239.445597] ? dump_stack_print_info.cold+0x20/0x20 [ 1239.450636] ? error_exit+0xb/0x20 [ 1239.454203] ? fs_reclaim_acquire+0x20/0x20 [ 1239.458545] should_fail.cold+0xa/0x15 [ 1239.458567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1239.458601] ? ___might_sleep+0x1e7/0x310 [ 1239.467582] ? arch_local_save_flags+0x50/0x50 [ 1239.467599] ? find_held_lock+0x35/0x120 [ 1239.467614] ? should_fail+0x1e6/0xd22 [ 1239.467650] __should_failslab+0x121/0x190 [ 1239.488537] should_failslab+0x9/0x14 [ 1239.492349] kmem_cache_alloc+0x2be/0x710 [ 1239.496595] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 1239.502143] ? rcu_pm_notify+0xd0/0xd0 [ 1239.506142] ecryptfs_mount+0xd2/0x1cd0 [ 1239.510137] ? rcu_read_lock_sched_held+0x110/0x130 [ 1239.515162] ? __alloc_pages_nodemask+0xaca/0xdc0 [ 1239.520016] ? init_wait_entry+0x1c0/0x1c0 [ 1239.524266] ? __ecryptfs_printk+0x170/0x170 [ 1239.528698] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1239.533735] ? alloc_vfsmnt+0x735/0x990 [ 1239.537718] ? __get_fs_type+0x9a/0xd0 [ 1239.541628] ? __get_fs_type+0x9a/0xd0 [ 1239.545524] ? find_held_lock+0x35/0x120 [ 1239.549614] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1239.555192] ? alloc_pages_current+0x10f/0x210 [ 1239.559790] mount_fs+0xae/0x331 [ 1239.563175] vfs_kern_mount.part.0+0xdb/0x570 [ 1239.567688] ? may_umount+0xb0/0xb0 [ 1239.571324] ? _raw_read_unlock+0x2d/0x50 [ 1239.575477] ? __get_fs_type+0x9a/0xd0 [ 1239.579382] do_mount+0x576/0x3110 [ 1239.582959] ? copy_mount_string+0x40/0x40 [ 1239.587213] ? copy_mount_options+0x234/0x440 [ 1239.591733] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1239.596590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.602135] ? copy_mount_options+0x30e/0x440 [ 1239.606649] __ia32_compat_sys_mount+0x664/0x790 [ 1239.611427] do_fast_syscall_32+0x333/0xf98 [ 1239.615771] ? do_int80_syscall_32+0x880/0x880 [ 1239.620358] ? trace_hardirqs_off+0x310/0x310 [ 1239.624861] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1239.629802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1239.635351] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1239.640382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.645246] entry_SYSENTER_compat+0x70/0x7f [ 1239.649661] RIP: 0023:0xf7f80869 [ 1239.653039] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 02:49:14 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r3}}, 0xc) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) mq_unlink(&(0x7f0000000240)='\x00') r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0xa0000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000040)=""/54) [ 1239.671958] RSP: 002b:00000000f5f7c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1239.679676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000100 [ 1239.686956] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000020000180 [ 1239.694227] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1239.701499] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1239.708776] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4800000000000000], [], @loopback}}, r1}}, 0x48) [ 1239.770327] Unknown ioctl -2122820351 02:49:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1239.834669] Getting sb failed; rc = [-12] 02:49:15 executing program 2 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:15 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) 02:49:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 1239.961833] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1239.991345] Error parsing options; rc = [-22] [ 1239.999980] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:15 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x4000026a, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000ffffffff}]) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000200)) 02:49:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x700000000000000], [], @loopback}}, r1}}, 0x48) [ 1240.066603] Error parsing options; rc = [-22] 02:49:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='\ncryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x78000000], [], @loopback}}, r1}}, 0x48) 02:49:15 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) 02:49:15 executing program 3: io_setup(0x2, &(0x7f0000000000)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x1000, 0x3c9002) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1240.229831] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1240.326666] Error parsing options; rc = [-22] 02:49:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/71) 02:49:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000], [], @loopback}}, r1}}, 0x48) 02:49:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='\ncryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:15 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) 02:49:15 executing program 3: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x800) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r3, &(0x7f0000000180)=[{&(0x7f0000000240)=""/87, 0x57}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000000002000001, 0x32, 0xffffffffffffffff, 0x0) tkill(r5, 0x1000000000016) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 02:49:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='%cryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:15 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x700], [], @loopback}}, r1}}, 0x48) 02:49:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e4e5c342f42f7b82f0103efdf17ddbe6084dd1b969982ed6002e064d2a34ab34f3326012c54faa607bf5009b8028adaa317105e1e2f03a2d9c5470dd97b52ff95ced549279559047ba2f62ff356348e0dd2fb782577616a1c48fb5c3133e984d3102cc630a583524f07a55304331c0f5ec508b24175a059359e9e473c760f9bc695a9747c0c5061946d0ea3ffd56ebc5ed8470b41545a59482b45cfe2b02b2ad85ecbf4ebedb930bef23ac668ee2065e7becf6ef31de92c1f6a9d8edbba5532a528dcafd481a781b47c75f300ec324f1d385a3cb6a5923fa091bef5997975c9dfab038898afb34aedf54e2", 0xeb, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, r0, 0x1ff, 0x8, r1) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='%cryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='\x8bcryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xc515], [], @loopback}}, r1}}, 0x48) 02:49:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='\x8bcryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x3], [], @loopback}}, r1}}, 0x48) 02:49:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x800, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\tryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000140)=""/100, 0x64}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000000)=""/23, 0x17}, {&(0x7f0000000300)=""/195, 0xfffffffffffffd54}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000000400)=""/7, 0x7}], 0x9}, 0xfffffffffffffffe}], 0x1, 0x40, 0x0) sendmsg$kcm(r0, &(0x7f0000001880)={&(0x7f0000000500)=@caif=@rfm={0x25, 0x8001, "166eb1efc5400c9c681d338189233c9c"}, 0x80, &(0x7f0000001840)=[{&(0x7f0000003d00)="dd37fca669f6498dd04fe4a11ed6db44fd41f6bcdb184df3b64fd4ba616bcbf31abde7bef391ad47fe6084fc81479992e7e981c28ab8e30b692ac0b2047f53f94f96888f9c14698a4002b341ad7558be8cad842df252f586b0afcf0daa8e72bfb8ead86b0b87e7ab614ce1c6d408e5bbb659c8a44753790a0f2a5f71eacf8dd3829f0e11b791479d1593577f2700089b019182d3eaceabcc24103897507a79d133b22e2abfde2a7065d0ec73fb2b87082382dbf1c65383561da3785c76c7a9aff7133593a3867235fe06901411d625f30899820846570b37e7bcc632f9e8e18ea2864f909d1eb9f6711e86ac8d211a0be50789fdfd9b13740059066191f1a100043dfe1a43033ccf5adca53543bfa7e48c2a6130519ee97beee315344b7e52d14498c11e6a8549bef99832c4f58f071f64f8559cedecee9b9c91d9d98cc802c8f4e71fe40b6a9513c2ec8136c9a643e3ae12a9c727ea466b56a40d0c76d166d313bdf0b5eee73f4611d5c72a123ee75ba42bb13865c7f14142a80da7cced4eb5a5f5571e900c40fe7bc33fa4177e51412f81ca10c46416345c6352321233f02c48671f65d9494a98c214421729117123a9206dd37eea31b83b621806eb17734f6754909e15b72609f9e90dd18071d1c59f51aacdef4180236e87918b49c0b579d6a312c375056b745972759f2a8f292342f481f687c0f306d554f67fd39fa2d789e7061c4583ff01cbb4ea3cd0b6c6ae4e59f55ff2b2f1b9d670f309ac5a720edae8ce72dfc351015bbea688511f7c7ad97393d654c6556330eb002ee7676920b85aac06cb7c2805adcea8488a7c8e42d4904f3c188cf4b84f5f016ade7e2c211aabb913bd717817bb3b452be2521663150a79ccce3bdbf595e6902995de3202198ce9a5ca120fefa1c6a58eee667f369f26b7e1d77318aa283b7644236a78a1d7b71067252def573710a4ffa86bf17cd9cd9512b7cfcffb479221eda59cd1290e828c795b659592051d29ec0ed0d229a92ff9d8f18fc23534595bf8a10d445464ad63625e37de96b7c506b98b515cb60b5877fc9220d18f85920ac619a4615cd6711f40d4b23059d6c2c7f2aa5ba7c65965d8cc6fc9d91ca4441061047965bec184ed98e565e7f0c0668505dfd14e7ba85df015caeafb39be22f1a07033ad1e01280430f40dbcc682b6988d5002724e274257a9a1def0295fb42f39392c7c9380d2ab933f545c4e95f49444298662b84c7bdc0bb1a7ed67fad06f91aa35235afbd629e35217fad48dc8ab85b89dfe97fb6f28d791b8aeab817ba03157f02e741dbe0bc24c6c86db96aa7240eb674e26b3817f37516b9945fc441c1bd10f3f0539ca8283f9f715e1d00fbc342c8df87655c0baf2404ca6d83b12c4f5da5d86781e004e89e5328e3ef974fd7277f34f73d52ebd28c7756c3bfa09f819ec7b7da41e2bbd5146ddb994a4c8a933d88ac80b7d43459d2b056a6cbceec8b3091daa0e1aea03ee8495d3d306b11691d2d63e05106c51ddda6688567851f1cec5954a251eba21651b355f55ab34c11b309a57f012821e8bf0e814921a78366c2cf2dafc362d5e9d2da0dfbcdd4af100f0ffdacaec75319d45310e32bf89fe409f9c943da11aeebbce03a94825a158c1b027b0fdce8fad7daaa77b2ac08ef692ec21bdb7f1a875f354babe5c7929c32baee63303056dfa234f4025d53a981450be178968d26c953ca9ca8354814270ff6ee772540fb39651bed4ecabc7603852135e9012023f6585054f3c489ee0a1b25b5a94259fd6e225fdfddcb77970b821ddef94272be595e255b6cda34b9f09a185ddf85671b43d752015d80126c5b54fd0a9b4d78d0abda003c1986f89e5dbd784dc47533e14c2f57e47cb072c61a9b79f162aa3b274ceb014b9fd3f1b7e0a7d1f214c557d95b7b386ecc5e5e7b6fadbc091f62d6132c3f33e2141eb54e26be0c7d3b834610fface6606bd8300eeabf67a56be9c4fda0e17022d22ce98448ede11ed173c9a9130b8a5ca3c676b1641c8f55e46b125d2c0a28b666dfee1581b46955f70e4f9495217d144e41e11a963fc572a79b3d6b0003a78ab8fbbcacedc3dd621d0d5e4ae7747e496317e24f0d31b3492426e2a3897e868b9a97a7372e6f1ef11f58b812a16f73db3fbbdc33e12f9a38aceb1e4aa992e9283d97361ebb0a3892b1548a9aa1de74eeffcc9e867bbdab0c4e33220f437376c35f6a810e2fae2dcc820099748fcfdecaa99d4824edbb6350a5465548d9ea8270c85c57b2ad321aaee8affd1709c952581f4f7481498f7f99dc56b813be6fd913f8169ad90e9d266899c7471a6cfeff8a98efed91d9574fe71e2d31e65fe7f6439dac335167f7eccb95bce08a0b7e87e8b839a208a1253735b1236f7bbf64bed041fe89b2d3271624c4e5933435eb08aa0f8887717c448396f5ca71258e67fb8b001c16802a953fc32f56629084d466c87dd4e44c90e7bd96a5e71f0d369464a8ddf571f7cb28442e48f11fed8b64190e4e36a086a05d313adc9e733f71e6ab2fc0f75e68769c1dfd78ed31fdecee96fb859140b753c6fbb1294e7b53ee7c6b2d2437d0b586629c22218f2e5b745f60c59e0be0949350d406dda2248fccd024d28f238b524013710c92ff43c36b39ba503c3ff35344cb0103f16b6e56653f14bf324409651b51dd5f2f4371fbeb107136940a72f63dfba7c1a602a7f2e47d2b0911918e3b5f5195046c520e8e15a7cc62f410725dfce1e95f65c0e42d651cca17bcb9f192b083275c0b190cbaf6f7d38b3ea069e9508f3025979b08bf6369dd2cc8b4c6ae2f88c1cf1a3beb60d274d86763401b014f923a9bbce4440372050748e567693d2a71f69f1a7f903208b0f1187f44a6d6045a7e28895b5e4be7a42a7fde2c5c324b09b328492c330850eefaf961a211e4a84c1eb588a648320194795fe7423e2e8b212908ce779962d85cc5ce350686edf749bbc0591432b7ca0aeafb5d45431ef3b241f36f85c4d5ff40bb549e6b677c71da5c1de7b149fd565461f7f7624eae5d7d5dc2687bf61024ea2e148bc0ca8512c66e1b824142b56f51e3d0a12518a2945bc829c24f7737c2b347c4a659b66bf6b2a24a5ab1aae868981894cf4bc31f800790d1ff62d7edf6c774d967214b3b12301cf3b2b32ccb2ac01bcba1c989788676f7c9fceea575ae52f4660cb656a0056f7fdfec5c223b48d8b86603969182f92c6dc058ad7e5f8209edbf7297600a6261b7b7c279fb5fa6c7914306f9078a0d2a8f331e2c9f9436e05e2a0865add876ce90b8f2ba51b1704c7a0b0588324c79d81f3e1beb36dd16686ce734db8ecf1648c7deefdd84cff73d05a3c3b70e52063b67f4c178f1be2be3093931fddbe37c24ed2e81e2c536ccaa608c5becc3de188fc7c50b29af36ebfd4fe78938299265593e8700e3dfd48c9007424c5c8650e7bef89faab09cc714d01771ec81c9abf3786295dbf6df4407e795c6f831abf67f67bf4549ae85061222f854c4b2af07da910b823d6db94d1d0b86a72d6096669cff8f4c3724af17db9c06afd624cfb7742e48addca4d189e2d96c15f78ae1a5f1aa73dc31fada47d3153bbc8675e48e74e27bd3913ccae36c4c21aa69742a208d89bdb2d0cf34e2477a52dfe370e258093d5026ce26dc030e041d16dedf13cd51488dbaf4de1b343648a3dd5b208971deb473cc225feeb8d22da1524e9e08b9411cd7e24e700f8d80e84574f86a9d12ac7463f1501fb4d9624652e7558e2016fd2f5d265ab4fb2625c793c23e7dc17c2a2745406b436ba0cb554d2739c766a4c39e51fcfe9a46a821526e3c48d33a7d9aa37f41a3dd6866c1ffcb74b72fa0cd5e457bd22b90dcce84c34c24325fae2dd0db75a6f6839beb5a741affc713610c853853640e237dee273b200267e7e5b92cfb1b118d89da1e69bf7ca7d4eed754134c580aed43dc944d2aae126fbdf6d868a3e4de9ddcd332efeba9fb084995748605b47b36692ab1aae12588dba4bf4c50aa8d60760d9a5fb2633604996cf978df01074d05739c8a55f27a19cd257f193cd1287a071709640ceebeb773ecb372ae4c74dc69a0bf60b2cfdd23e9be986b1af8d4aa5c49dfa655123b5c7dffe49a3d3ba7721defa3fbc9b0606b4cf356a6e59dd85fe0ac766b629fd2a95a60ba3b443965512ba2208219384c7202b8867cfd9b6d41ca736a4de536f621f3472530a9029840ba959b9449cb28fd7283131cf24b740db4f0c79968f54fa801063db6bd989070d0a5ba77d8aa6b9427e0b5c655b3bf6447de080a7e2e8d7c6eee48dd68158ab5c21a50eeee813159399e8adadc85e22401bc97d48bd2f196441bb4764027e92e7d22e2e565e8306ebda75170158197f1d8ffa647cd318842f9721b4c4befe6c485152575fbb9131c2959247d9727aed3f1e6fd8f53c21861a4bedb60b3a0ad5a64e16eec7948ab353d687b28652a10060934842bbcd47a469813ef25f4c8bbb579812c2720b7f21edd5057fdd78d527598f9e2a1ffd6d73f3a50c0b7ff6358cd2e0bd0bca4166d2dd9d3e298efc7f587b11a6af2afca8a9b001b71d799d57dbbc1da00eb363aabee9c8059d1b51d03e8507f7efddaaca28e8ba2aa004c5f71cec2a016fd610cb77e15c27257edf2d90bc44c5685cd25d1956b8e957964a7a0be0e8e76395cdc6ad64f996bd370e7673e933a7112eea9f5f878da5be91048580dc4ee8b2ca7c80723f5e2498541b5dedfa2090e4d6970d7f7821eb3d6a878f5962556dddd72fd43f03aef2b38475701644e6f239f256860e7faf0bd37b9ff228c27ce8b3ab9f1d4882f9b973404a88f4b3748244ec82343a38ec2dcf13e2995567f23f63f0cd26d45fb47604fd0723921b303e0de8a56bc8b7bc6c936feeeda67e9357448a469f09464a979fd8917dd5fe4376fddab62ddd10a8d5680d564946f28708b1dc28cfe6449a8868cd06e7fc9f59180660d618719de711a971d6c9f21d7f46b38be3b07ff81e2598fae14af526b390b898d33a601eec00db691435404adf4ce6fbe1997d45de20b8314c1f97b3168dc6b6042fe5e2d74da04d6192821d43ececade07a7788b9bf75e2494560cfe9c77f411e760083a23a8f71dd236af856c80e6e7c514ffe837e5098a57dd4d743d514bfc0069a2ee73bc935dd21cc38eaf5e121066b19a8685cb99cd9c233448cfa3071dbb981893d411d75bfdd6fc6e1a3d8a270881f15ad032e282c61b7e56256bc360952556b80693ac3fb736ce46d879ec879d72e5e4a034605e9dc2cc5ee6c4c81abcdb9553301a2d9e366242415313e91646a80b3985b5bbaaf57a9d93bc9c37f23cd3868838de7b558c13e95b21b8a12dff70647a367ef2146fd2281bcaa66b1f857a3250429a48f2f6e1cd5e4bf5bf9ffa518fe5d158fd8e96db152f08f76e3a38a4a7efcfc99558828dbb55424402960c318ade87569f21ea018891433ca9678096231b25ac33ada65318bd0589d8f0d96585daac8b86f9f6de0aebdbe25e0cb96a708e8db149b13b15ebcbfa66ae2866d6a93c4a573d7ab500b00e0fb24cbc165f3a74e27eebe215a9e812d3ec4adf14ef8e0add59539d2add79056c6796faff0014001ea6db5b886c40c523f2eeb0a4855035d34eeb03312b853d7a67af54f8756dd6a1d7ee5f8129ea9ada117ec9ef350b30fa742ed62d71a99a6591ec0c59fa26ce1676e3d5405be9c199eba91a5f82dedde878aefd9ebdd6fd4bf03307ea8afc2b436d7dd0fed7cb6d80134ad50029eeebca301350d056d604ce2", 0x1000}, {&(0x7f0000000580)="dcb6c0d3c523e5212f60385aa26b9fb28acee50665c9a03c85c734cd5b841642d26100bf91e63f", 0x27}, {&(0x7f0000001600)="97d0c8beae46f80181564b54a584cf8ce51c89f171ca6eb5445e8531cca4e0b8bffba4b9067a49db8629a00c61baab64744a855c6f116b4f42e165f2d56a2e6e4fedcca9044638edac67c30a370382298749ac7fe324f2d19b1a3d47735d3da52e586534f6c1ffef84be528313338c5e07e167ffeff1a4763d3f266accd2ff4ba249b8c881606830bf3a23b958a72b572ba4de13f2a5207d8df52c1d01cad19efc3c7efc8f49e5b54f7010909b9f0cea21f3d5d5c3e3fb63ad57194b8563", 0xbe}, {&(0x7f00000016c0)="f672887c07ac07f9c6fb3bc1b93cb26a222582df7a0a57d2f05f7de59c322982918b73fd7ca7904e1c2e80d23ccb089b021d228f6cebf25272ee1b21627b1a794f576d640e481a0468aeb3", 0x4b}, {&(0x7f0000001740)="917a413679b705ea1d06aafadb8414a1a570a47883f016e26c125aed5d1a395632a94f72875c90c5c8d882c2f694899660b8998aaebd322a1937b74a57117582b88282b763220ea969a0072afde49d340dfae0e73c8d7a7c507b63d2ace7e13eec63ec7e45008c6807d760d3ed96c492491dad4c49855c5c383be2b3fe151ddd002b9e6d8489e654107ee629e1dbb246ac8469688c05409e002b638a66f0afa262f4c2b6eeac804a25b63addc5482263193c6022c0df0b39fec1e246c97e981b99a7f17167d7045e8a711745e133d358e5600c3a1221d3cbbe667a324cdf", 0xde}], 0x5, &(0x7f0000004d00)=[{0x100c, 0x11f, 0x3352, "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"}, {0xfc, 0x119, 0x4, "a999c61a2a9244b6545b2a1fa132a817362192877151bdeb6ebeddbc616331be6407c461f66dba6a733b4390bcad80fea0123642385533edf4679ecb2286295e5287b9968bcceb9d7df5799c42448859affa638eda28b3184aeee04dbb41e604d8a3de18f0a3a83f7fd39dff5ed16d9209dc9d44193ba8c14229890466b9d6e7b08389357a28441aa92cd054e0e4f0c4a611ba27d1dd5465aa3057861c201d4303ab2d974719f0e5bfc88611c43c0c65402870dbf901550e552d401909dffeb315d0aeffed600cae5236fb9a79b6b2503f1f7d2e04a9e9e5762f8ca7ab3d39ebd0107d52e4d9014ac1f7bdd579789513"}], 0x1108}, 0x4000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/143, 0x8f}, {&(0x7f0000001980)=""/40, 0x28}], 0x2, 0x0) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\nryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:18 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/128) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], [], @loopback}}, r1}}, 0x48) 02:49:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') memfd_create(&(0x7f0000000000)='status\x00', 0x0) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\nryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e%ryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x7000000], [], @loopback}}, r1}}, 0x48) 02:49:19 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/128) 02:49:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x2000000000111000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc0006a00}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0xe4, r3, 0xc00, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x62d3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0xe4}, 0x1, 0x0, 0x0, 0x1}, 0x4004080) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x8000) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000200)) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x78], [], @loopback}}, r1}}, 0x48) 02:49:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\x8bryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:19 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/128) 02:49:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e%ryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xfffffffffffffffe, 0x5) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000000)=0xfffffffffffffff7, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0xf9, @local, 0x942b}}, 0x0, 0x3, 0x0, "bdae451b63e1b0a626232efaf2182f0b04f5936fd50d5e4c92f352695468398d148884d86bc0dd91eb20ace20cf000bd687e66199871d7963373f42eba395cbcc68e8047d5c01052789833f76bf33830"}, 0xd8) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], [], @loopback}}, r1}}, 0x48) 02:49:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0xfffffffffffffff7, @dev={0xfe, 0x80, [], 0x13}, 0x7}}, [0x5, 0x400, 0x6, 0xa3, 0x5, 0x5, 0x6, 0x30, 0x200000000000000, 0x2, 0x0, 0x6, 0x1, 0x200, 0x100000000]}, &(0x7f00000002c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x9, 0x2, 0x7ff, 0x9, r1}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d1707bbc73bf9c05d5d492e7614a5a741e804f450f01000080f2f2d480ada7"], 0x1}}, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000100)={{0x7, 0x3, 0x8, 0x0, 0x2, 0x10000}, 0xeca, 0x6000000, 0x9, 0x4, 0x7fffffff, "29aa7a1b05bf6d174542f8228312fcd2e6c9297400641ccffbcc2c7a3f94acc68eb2ae39b2287c38ec3f55f3b22edd2e24d4e24c026fc39e4a179ce6e8b1707444a1e8463fba17fd9a63bcec59148c21aa183fb33550e7d4b861e0755be6adb26db23883442824e0ca76505641f5f5191a9f488c7e89602772e4e09bc2e25781"}) 02:49:19 executing program 4: io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec%yptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xe00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="55e5ef626808fdbda7d88c3027ef1b92b8c57b04d676de6e2dd74ef2eb83cd95dc90858ea5c9819a7d0ef07af3c056b91343fdcb0f324690846c99e25a233fcd11e518f9e785d61267a15881feb8a67995c52229d28a8d9812929453d3a01b99662d9d5114bf747bf4cc1e11d1ab431565bba0a1a6d17681cf2f6075eb8a06181dc0021227aa197b2140950650f7daa70b52f8e1aa811dcac85c7360bf21f2b5622c9a152c8bbeaa7ca53cf3b5a396dd3be21bc482091465130fe0ee1a7cb8866d9983d3179bdd9aaa92ff2aae61243cc5fcce4a026a0cb25ae01745c5c432dc1c1041a2a606f9a8b89cacb233840e"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\x8bryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x7, {{0x2, 0x4e20, @empty}}}, 0x84) 02:49:19 executing program 4: io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec\x8byptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec\x8byptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:20 executing program 4: io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xa00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2d480827deb1faab0707c2743b74d119990a2c7bb91dc0545d786eb0f2d0e1ea781e3260573fb986a4e6caf3ef66f00e4e3549986ab2670308af2d2fc5f03bac2c88ba9c0000000000007fff17395a6e80e94d78acd2be234d1e69cdb0"], 0x1}}, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000000c0)={"9852fdff49c803a36678365abd88acbc9ffc5de195e59cf1a8de1c95fee89b9cfd9cd3e7c1a41d8f0bc360bce9cbba785fccc7dc5ec0d0191960700dd1797f3a6150e626dacac5967f86a5d39af37c0589c173e9277481c3020897748961d921449aeb777b61d4085940bce9eaf74ab6a2755908b1ecddb6dc12e29ec3895d45e5e2dd9efa70bd1736af21f040672695b21f538e62b98cabb3f4fa0943107a8253c596cdab691aeb0226628777339acec1d2dfd384dbc970a45d9190a3fcbfeb6b6f1dc319e60104018b34394747cc98cb332d00bdcb0e93925bab72b3b64951aee3f7186976e931e7187776b33c762931cffe539dc29b5ce7935d1040721f539e2dd621a392604229d3dc1ca1e07c9d888fb843c321da6390d92504129dba03ccdfbede5b90e7cb0a88c37280920c80591ec9ead7bab401aeb6e97d81adb97190ccdbe226b93fb996ab9d2e4c265e6f9cca59e3e381a251c7a675c06553b9f7095f375258544bcfb6ed8c640a66f15eafea646d11f86fc5834c0013a3fe3a4881b1a89f99365977983735226bd56e753fcc68b4b0621115983467c76ad62c48be84aae027744b20ff879515a3a93d17d468840b48a03639fcd3d1a59cddee3b7068a35655540b29e590e897a9c0bdc1fe9219363f3b26970a52820ee15399c47975b54acb862781f3527d9e2715e2e366db6eb5c3e61b26259dbb0e54ef1e92edb4d913b8b1d27b4b01101697ae0ca327b5c8b3bb4e24606cd835005866dd4ae78afac5f51d02f1a9569d57e12fadfba572e5b787132d937e3d0dd226ae0a939a203825856a07794e2fc40bab9be564e4a4f797b7fdd0b6474b1a693dab07f7c299c9a3abe72508cafe013348110f58f36741cd38f446f4add2838a4da502effb83d226112f887a89e309eade5d779a14488d0660694f73d70844069bea0fd0c625f3437e76f8919c3d0802bae6dbb509326ed155a8384e2997fb1e777ccb82b2c0df006c1da98f7ab8bdbb9ce79490b1c9705542330ae73bc72eac210606a2a4dc3114a6fc525c462c42c27507e84ce4cd0417045832db76ed5bc0aea19836a8fda81a1eddd11e4c87253341efbde065cd885def812176d9dc92b313579a78124579e299bd5225eba1117d4825fea87d158bb89104b0944c55c8500e2a805cde9c8b4f2d714515abf5b4c00e9dd73b629973d6e820c6ef0dab40057ecaef8391bac59b29183ffa892367bb49b9498f877bdd8dc4854bb6e1ef0314d00314db38b1469c5d1fc0517c7145041c5a265c0dc46da9e0c630363172618b9797ce0766f02bb3bfa023e51f7537912df95aac9a2008d7c520c7c03712fe6d5573dee5154184c725a077ee3cb5fb058569da7a6c172df1f9dce22cdb7bcc60bad73015425968098b9caaa21e71e99981907c456f0d90e176b812ea91adf4ac98a250a7"}) write$FUSE_POLL(r0, &(0x7f0000000540)={0x18, 0x0, 0x3, {0x39}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x7ffff) 02:49:20 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec\nyptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x5000000], [], @loopback}}, r1}}, 0x48) 02:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec\nyptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:20 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xf5ffffff], [], @loopback}}, r1}}, 0x48) 02:49:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x2000) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) 02:49:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\x8bptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ec%yptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="bb6c9425c1c03f49ab8858d6fd3e3d3f2081576b10e565aabd3171445ecf60c873da0f81ab637884849160436b62500e586f49af2899b0af9374585ada405f03d3c59fa2"], 0x1}}, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @local}}, 0x4}, &(0x7f0000000280)=0x88) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f00000005c0)='status\x00') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:20 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x5], [], @loopback}}, r1}}, 0x48) 02:49:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\nptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\x8bptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10000, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:20 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:21 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r0) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xc0fe], [], @loopback}}, r1}}, 0x48) 02:49:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\nptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:21 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x581000, 0x0) 02:49:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr%ptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:21 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xffffff8d], [], @loopback}}, r1}}, 0x48) 02:49:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:21 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:21 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000180)={r3, 0x1}) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry\ntfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr%ptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @loopback}}, r1}}, 0x48) 02:49:21 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x933b}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x7fffffff, 0x6, [0x3, 0x81, 0x8, 0xfffffffffffffffa, 0xf6, 0xfff]}, 0x14) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:21 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @loopback}}, r1}}, 0x48) 02:49:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[]}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry%tfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry\ntfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x9000000], [], @loopback}}, r1}}, 0x48) 02:49:21 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:21 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2a801, 0x0) r3 = creat(&(0x7f0000001240)='./file0\x00', 0x182) r4 = syz_open_dev$mice(&(0x7f0000001380)='/dev/input/mice\x00', 0x0, 0x800) r5 = syz_open_dev$amidi(&(0x7f0000001480)='/dev/amidi#\x00', 0x21, 0x800) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000016c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000017c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001780)={&(0x7f0000001700)={0x44, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r7 = dup3(r0, r0, 0x80000) io_submit(r1, 0x7, &(0x7f0000001640)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000000)="f4e467776884e3585e162183b37a02b84cf1a0ba37df13561907dd9e18a6f05a3d8971bf844ef83d85c354d59da1c94583d25aa0330ae21bc08f29f570ce7184187cc4c0a9d1f1ff97df018dcf", 0x4d, 0x6a9, 0x0, 0x1, r2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000200)="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", 0x1000, 0x0, 0x0, 0x3}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x3, 0x4, r0, &(0x7f0000001200)="facccc02391f1bf3310de26fa83b1ba597e346bd8b0f8ba89a4589b64f04b255a2", 0x21, 0x3, 0x0, 0x3, r3}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f00000012c0)="fb228f0acd383866b92d4b65e6a8e641b50d61d6de85406656d98a296fe1d32d0907b993ba7e6234c2a7d74cbae6e0081a4401a690508076d243a45ac6ac0d59537cefad5ba980d7f190748ec62353b8b0397dd0bcd21a93c9c6bded95b31364ddb1772bf7a0a3ab93898863c8115da1991eab0ee5865acee570988eb13ef80c4d9d70407c402b5a383c68402c66df88927c4e6cdf2755dfda7e4d964bf2f2b13a82e9180cbb137d739d6610", 0xac, 0x3, 0x0, 0x3, r4}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x1, 0x6, r0, &(0x7f0000001400)="3875ceb72c771159c8455a1ad2a919485dda5c259df77f763bcee68676af147eff2371be81394a39baa49e2178439a4710785b1dc9c302c129d16df5e804611f7b48bf49acd105bbea38ede7d355", 0x4e, 0x7fff, 0x0, 0x0, r5}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0xf, 0x5, r0, &(0x7f0000001500)="49310c0fc67bc484f357753557d17437dc2e824c1e3ebbb35d937cac5a9b756a057597cfd6b355c86f4d4e", 0x2b, 0xff, 0x0, 0x0, r7}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x8, 0x66e, r0, &(0x7f0000001580)="d44d91a3986d3ef66325524a579aff1d3e0de83aa439886cf17635bd53f7cccf4572f8021e2bed75b48ccbd09935c5dfa302702d5cd2280f0bb20efdbd51ebcc514989217c5ab3504bb47a50333fd99ee1d085aaef39001967c7d8c5a04db8c54cb373f9f48f9a4f248e7a5313facb3172", 0x71, 0x10000, 0x0, 0x2, 0xffffffffffffff9c}]) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x1da, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="dadd56d96d973ff6a05e34434a52088a624f5af01dd213dad74d2ba6fbfcd716008e6e70f9b1fbf18adf8d98f4272e85c4789823f1883a09a10a82c14d164a9340058393f36cdb7bbd119606c55ca3d1e4669a6ae81d0651b888dd7170fc428c38d8348983206996c02ef6e2f4a57ede3dfb637439152f203081c12606052271596d9c5e078559b1383863be46a747e60eada44bb4db58c464b0e455"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f00000001c0)={0x8001006, 0x4, 0x1}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x9, 0x4) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x101) 02:49:22 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, &(0x7f0000000080)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xff00], [], @loopback}}, r1}}, 0x48) 02:49:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry\x8btfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry%tfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfe80], [], @loopback}}, r1}}, 0x48) 02:49:22 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x4, @mcast2, 0x3ff}}, 0x7, 0x7}, &(0x7f0000000040)=0x88) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={r3, 0x2c, "3704b350ba065dbb77b1956a0589dd4fcc11f5543e461bf491eb7a53587e5ced115e0d433d0ac9a582624fe3"}, &(0x7f0000000240)=0x34) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:22 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, &(0x7f0000000080)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp\x8bfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000000)={{0x9, 0x1, 0x5, 0x80, 0xb5, 0x3424}, 0x6}) 02:49:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry\x8btfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:22 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000180)={0x4b, 0xd3}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000100)=0x4) 02:49:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xa00], [], @loopback}}, r1}}, 0x48) 02:49:22 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x0, &(0x7f0000000080)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x7fffffff, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="89c9a69095494d8e23ed60a4f88eba4c9ada717883909261ac843c2bac1ae0998fa9a85ca1a572fdccc55dfc0646d01e7e5b7e97783e3fe436bc6b34b0bf00f167d45730da70fb83602729"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp\nfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:22 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x121200, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @bt={0x8001, 0x1, 0x80000001, 0x400, 0x81, 0x8c0c, 0x5, 0x5}}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 02:49:22 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x6000], [], @loopback}}, r1}}, 0x48) 02:49:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp\nfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:22 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)={@host}) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r3 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3001}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="0000e900", @ANYRES16=r4, @ANYBLOB="10002abd7000fddbdf250d0000000c00020008000900000040002c000300080001000300000008000500ac1414bb0800030000000000080007004e2300000800080005000000"], 0x4c}}, 0x4000000) 02:49:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x9], [], @loopback}}, r1}}, 0x48) 02:49:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp%fs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:22 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f0000000000), 0x112, 0x0) 02:49:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp%fs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4], [], @loopback}}, r1}}, 0x48) 02:49:23 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}) 02:49:23 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt\x8bs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@rand_addr=0xbf52, @empty}, 0x8) 02:49:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x900000000000000], [], @loopback}}, r1}}, 0x48) 02:49:23 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:23 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)) 02:49:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp\x8bfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt\ns\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4000000000000], [], @loopback}}, r1}}, 0x48) 02:49:23 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:23 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2, &(0x7f0000000300)="edda7741737f4f4a74ffe4e6b080af9590ace77e98e321100e8a6651cc76a8084489512c2e41e28dca76319c4845604116d46a3fb03d53ecb50a33d5ddc6ccbb3ecb1d313b86f2fb8b42e45b2db91054abe4369e3c260dca1c05a9306070de6a769118a4c2af43ed76ddccf965a8da6ecd090b0dbf63bcb8cb7f7414a1fa6f973880386b593677cadea53e8a6ed8ab9b5c085f2a6597f266b48a77b264816506380b4486fa40e3605b7f4b90eeda04af0ee6ade6adaf1d67ad3099588489711e669fc3d2a68e76e565e3dcb0334e1712a31f473a7f370491963bbfa247a1f23aac") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="df987da3be72c50df36603e365982270392401f75e400a826bf4e39972615b80acc1b85eabea16e66a0ed00d68a282ae372af7ed04137cfb0186488f64d2ff82514c8f336777fbecb126dbdfacb253386bf36f6fe421c4a6f5e84328df9a"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) pipe2$9p(&(0x7f0000000640), 0x800) sendto(r1, &(0x7f0000000400)="d9175b21a96a6b680218196ae5a98b49d3451c0bed23270aa3a83b3af8a971e78bca0d67dd5d2160d119a0e5d6c379ac4529eee65a604b4538527d75b0a2f05a000505c93ef015c2e8343c2e78d3ff7df6685fceed163478770c04ac48e21fe4422dafefac3bd4019df5d92b23468c67cc25c3eb3d35898fc86380aed12d71945d37e132c3d7272751c21ebb73239f9f52296d1d76a29c01fd03fa67ebc543c52a2a7c2d91114493282a04917656f450", 0xb0, 0x0, &(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x1, @remote, 'bridge_slave_0\x00'}}, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') r3 = accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14, 0x800) bind$packet(r1, &(0x7f0000000600)={0x11, 0x1f, r4, 0x1, 0x9, 0x6, @dev={[], 0x15}}, 0x14) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x100, r2, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x600}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb5}]}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb26}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x958}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x69}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x24000001}, 0x80) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000740)=0x0) fstat(r3, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000008c0)=[{&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000700), 0x0, &(0x7f0000000880)=[@cred={0x18, 0x1, 0x2, r5, r6, r7}], 0x18, 0x40}], 0x1, 0x4080) 02:49:23 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt%s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x60000000], [], @loopback}}, r1}}, 0x48) 02:49:23 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) sched_setparam(r0, &(0x7f0000000000)=0xc1c3) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 02:49:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt%s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:23 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], @loopback}}, r1}}, 0x48) 02:49:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt.s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:24 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0xa6, 0x100) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x7fff) r1 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0x400c4150, &(0x7f0000001f64)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)=0x1) 02:49:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt.s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:24 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1809b41b395057bc69ffe069fdd75c27e0f0edb30d2e3cc98c0f8068f59a5fcd97378eb36de8eca30f04a532a8438662937364a6c8f4030e4e0b673034b6fc8e76c7b81928d2"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000380)={0x0, 0x0}, 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) fcntl$getown(r1, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f000053cffc), 0x100000001) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x87, &(0x7f0000000040)=0x0) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x610000000000002c, 0xf0, 0xf0000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x40000000], [], @loopback}}, r1}}, 0x48) 02:49:24 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x208100, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000300)={0x3c, @dev={0xac, 0x14, 0x14, 0x1c}, 0x4e20, 0x0, 'rr\x00', 0x1, 0x6, 0x5c}, 0x2c) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) listen(r0, 0x61e) write(r0, &(0x7f0000000200)="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", 0xfb) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x802, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000100)=']em1\x00', 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x2b}, 0x43, r4}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) 02:49:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt/s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:24 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt/s\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x6000000], [], @loopback}}, r1}}, 0x48) 02:49:24 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/128) 02:49:24 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x441) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000000)=""/31) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) socket$caif_seqpacket(0x25, 0x5, 0x4) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 02:49:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt\x8bs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf\n\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x600], [], @loopback}}, r1}}, 0x48) 02:49:24 executing program 0: pause() r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x2886, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x60) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e099b5dc3df497ca05241545f5048000000070124def07e4cfc2f6329858ee35f65ef4f4684b61bea32868cfd397e68452808c3cecf7cc81b51c50fd1d4c9e89f0f8a31fa26aff2375b4003df149b12357395f684037ebee919f57fcf26056115cadce3d3057a2d533ce352d68de902f790adb2a691de5790ff25cd6e4549a2275a2ab424863f88d23b5c889d6d49cf6c9706d2740659329a5c235225cb6e678c56c4c0cfb174975852ec2a70000000000000000"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0xffffffff) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:24 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:24 executing program 3: modify_ldt$write2(0x11, &(0x7f0000000000)={0x9, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xff, 0x9, 0x7fff, 0x1, 0x0, 0x4}, 0x10) r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecrypt\ns\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x60], [], @loopback}}, r1}}, 0x48) 02:49:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf%\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:25 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) rt_sigprocmask(0x2, &(0x7f0000000000)={0x400}, &(0x7f0000000040), 0x8) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:25 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8dffffff], [], @loopback}}, r1}}, 0x48) 02:49:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf-\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfl\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:25 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, 0x0, 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:26 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x6, 0x2001) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000100)=0x8b07cc0, 0x2) r1 = perf_event_open(&(0x7f0000000140)={0xfffffffffffffffe, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) fchmod(r1, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="8557fa019211a7d7038854470a3c148538c120badc08c2f51e59755a5c813db360475812e7089bd2cc0544bb359b33bf1ef5d89b84e47a6092"], 0x1}}, 0x0) mmap(&(0x7f0000dfd000/0x200000)=nil, 0x200000, 0x0, 0x100110, r1, 0x31) getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000200)='\x96\xd5\fn8\xd4\xd1|C\xa6e!n\xd3\b\xf6\x1f$\xd6\xbdt\x99>\xa0J\xc2\xa29bo\xf8:\xca$\xe7\x83.\xe1\x03OGJtg\xdc\xefh\x12\xc4\xc8\xf9\xd7\xaa9F\x9eJ\x83\x0f\xc9\xce\xa0l\xbbU\xf7\xceq=\x87^\xe1\x97\xff\xfb\xe6Uj\x84M\x80\xb4\xfe\xbdJ\r\x99N\xa4G\xb3W\x0e/\xf2\xa4\xfb\xd4\x92*\xc3\xfa\xd3\xa17\xd9d\x86\x8b\xb9\xaf\xd8\xbd\x01\x81/tg\x11]\xed0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000100)) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x101000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r3, 0x800, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x1) 02:49:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x7800], [], @loopback}}, r1}}, 0x48) 02:49:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfo\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:26 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf\x8b\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x50], [], @loopback}}, r1}}, 0x48) 02:49:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfd\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:26 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x1487f, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000100)=""/143) 02:49:26 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf\x8b\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="002779bf307b8cf872156e9d5fc4c174a7d037371be4b55720d616fbd2d8fd66c162a062c2ead6cc9dc59edb4ec873d09905b89b88502e61a798d3b9761f7826165c44c3a121b16bb030585c86cb82ee7cdb06f6dfa842db54e297dcf75acaf94b8bbe804e7e673b33646d525ba240b01c18fcf627a9d54943f4ba16ea58783e56937dfa99d3ac3f8b3df2c4b11ab81b741863c2f046d5a4ad30a8842bca88bba091c8486c9be5154f453128c9f7a9db1e8bb0d0d259749566fb0100890b4b450b3c950554f05d900ce957f10e3497bd6f7960529f4d28a602ef53bb33be6dea375f055061107ca09403714496ab8d733fed781bb3b2c146e70bd780cfa4a0a942bdacdfb4"], 0x1}}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000002, 0x30, r0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/241, 0xf1}, {&(0x7f00000001c0)=""/208, 0xd0}, {&(0x7f00000002c0)=""/124, 0x7c}], 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x48], [], @loopback}}, r1}}, 0x48) 02:49:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x40900, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@remote, @dev={0xfe, 0x80, [], 0x1e}, @ipv4={[], [], @rand_addr=0x3}, 0x3, 0x10001, 0x9, 0x400, 0x3ff, 0x2000040, r3}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {}, {}, {}]}) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 02:49:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf0\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:26 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf.\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000001c0)=0x5) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x8000, 0x8000, 0x6, 0x80000001, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0xffd}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="e4861184ee74158bbdacf2c7497cff857c6b312ab3a0319a188dce3e9671f46e13ec79035d7dbf6f11dee4e11768854f70a9189407c8faf4c0f040b000cf197bcce5cc0fa18d"], 0x1}}, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x0) 02:49:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x100000], [], @loopback}}, r1}}, 0x48) 02:49:26 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xe74af12f45dfd334, 0x0) io_setup(0x4, &(0x7f0000000440)=0x0) io_submit(r2, 0x4, &(0x7f0000000580)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0xed8d85bb384c4000, 0x0, r0, &(0x7f0000000180)="d86b16f9133473d6e387df83007f5095740f1102d8f0ec3beeb941c3ca022d9dedb8841d02470c53799f47e630c9ff513ef7d3bb35f791f4612792f5a61faaa96c0be485b220d8f2596ff25a46e0b63c133e605decb9e74b033ffc05a7edd6c1b0e324acbaee89b94fdbda64c1485ec01517d8b3acf19b3df5107b5e9adc4815e9a0", 0x82, 0x0, 0x0, 0x0, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1aa6, r1, &(0x7f0000000280)="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", 0xfb, 0x798, 0x0, 0x0, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0xd2, r1, &(0x7f00000003c0)="16d1def318d53bcf3fd3cc5da62406ee9c48b9", 0x13, 0x6, 0x0, 0x1, r1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x4ad2bf53, r1, &(0x7f00000005c0)="19c2b4fc314c8bb04db45401e16bbcee170a75ceab5d284c6e53c8578b9538051ae5e5906f7538148e262fddc98415f0f06646ec9b352c9bad0266e4e6311e574c910d89f04606b270c5a0fb3fa367c4a6764632cf266d84aad2db59c33709e2f6f3707f99f2c5de419ffbf5ccdd8f7cd2eaedfad9ce52735506c2e2952f11610840f66d71fab3d1e8d95eb012efb4652d8f7155c13556f48bfb7f78c3c138b54f4d0db22ec8ffd24e7369f81dce19d7f10c08c2cd6acbd73e5dbd644c8ef0134de04841a9c390ad466097befe1b59fae279df1bb759686cd2cdbd478d62f2ac43b56134fce456ab800997c044e3adc4174cd4924331dd89", 0xf8, 0x6, 0x0, 0x0, 0xffffffffffffff9c}]) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) io_setup(0x5, &(0x7f0000000100)) 02:49:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf+\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:26 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfc\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8000000], [], @loopback}}, r1}}, 0x48) 02:49:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfi\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:27 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:27 executing program 0: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e8aa00030f7aabb27c7a7e94aa2e9bfad195cf02184f09a816f7c51ed542119a6303000000ddf62c8d19e63115a2d905da151ee470e467d353b5ff8dbfa9a529a785d3a83ac8c58a31ac60b6cba757174dc67b696f07226d898404b008557338f8d1b8"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1e3, 0x0) 02:49:27 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20002, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000100)) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000040), 0x4) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfp\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xe00], [], @loopback}}, r1}}, 0x48) 02:49:27 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/128) 02:49:27 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf-\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf*\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:27 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, 0x0) 02:49:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x40000], [], @loopback}}, r1}}, 0x48) 02:49:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xa26, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="7d295aa90b046563d3560afbb2be35df05f468d44c3c522a8edef3"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:27 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TCSBRKP(r2, 0x5425, 0x6) io_submit(r1, 0x4000000000000027, &(0x7f0000000080)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="09c861a43d3c05e0fbcc0e082dbd7000fcdbdf250a0000000800050000000000080006000700000008000400000001002000020008000700033f6d7b14000100fe80000000000000000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x80) 02:49:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf\n\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf.\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:27 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, 0x0) 02:49:27 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) io_setup(0x7, &(0x7f00000001c0)=0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000140)) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x10000000], [], @loopback}}, r1}}, 0x48) 02:49:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfl\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:27 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, 0x0) 02:49:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfi\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="29233137f34a20fe0440506fc8c63a30a2a9878def57cbae6a3667b1dd9afb8fcd7649b083b4d996f1b3ed7894c375eb54571076379dc2"], 0x1}}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000180)=0x69c4) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)) r2 = fcntl$getown(r0, 0x9) bind$bt_rfcomm(r1, &(0x7f00000001c0)={0x1f, {0xfffffffffffffffa, 0xffffffffffffede8, 0x80000000, 0x9a51, 0x6, 0x9}, 0x4}, 0xa) r3 = syz_open_procfs(r2, &(0x7f0000000200)='\t\x91\x03!status\x00') bind(r1, &(0x7f00000000c0)=@isdn={0x22, 0x4b0e, 0x2a6, 0x7, 0xffffffffffffffff}, 0xfffffffffffffe0d) preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfe800000], [], @loopback}}, r1}}, 0x48) 02:49:28 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) setfsuid(r0) socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_setup(0x1, &(0x7f0000000000)) io_submit(r1, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) connect$netlink(r2, &(0x7f0000000080)=@unspec, 0xc) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000280)=0xfffffffffffffff7) inotify_add_watch(r2, &(0x7f0000000240)='./file0\x00', 0x101) 02:49:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8], [], @loopback}}, r1}}, 0x48) 02:49:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') getdents(r0, &(0x7f00000001c0)=""/25, 0xffffffffffffffed) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf.\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfX\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:28 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x400, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000200)={r3, 0x32, "30cd19a73dcdfa9e1bc42890b137ff2f1c7080d82fc8983c916b79ba49876e86b4adda5f5f5c101b535c24b5ffc618b01b5c"}, &(0x7f0000000240)=0x3a) ioctl$RTC_PLL_GET(r2, 0x801c7011, &(0x7f00000000c0)) 02:49:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfx\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x7], [], @loopback}}, r1}}, 0x48) 02:49:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1809b41b395057bc69ffe069fdd75c27e0f0edb30d2e3cc98c0f8068f59a5fcd97378eb36de8eca30f04a532a8438662937364a6c8f4030e4e0b673034b6fc8e76c7b81928d2"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000380)={0x0, 0x0}, 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) fcntl$getown(r1, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f000053cffc), 0x100000001) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x87, &(0x7f0000000040)=0x0) io_submit(r4, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x610000000000002c, 0xf0, 0xf0000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:28 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x800000001ffffe, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$smack_current(r0, &(0x7f0000000040)='securitywlan0*.keyringvboxnet0@\x00', 0x20) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/200) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) r2 = accept4(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80, 0x80000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000300)=0x10001) 02:49:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfu\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x80fe], [], @loopback}}, r1}}, 0x48) 02:49:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf#\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{0x7, 0x9, 0x3, 0x6}, {0x5, 0xfffffffffffffffe, 0x7, 0x8}, {0x7ff, 0x46ec, 0x5, 0x9}, {0x342e, 0x4, 0x100, 0xfffffffffffffffa}, {0x4, 0x9, 0x1}, {0xfff, 0x35, 0x8000, 0x46}, {0x1000, 0x7, 0x1, 0x4}]}) 02:49:28 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4400, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) r4 = gettid() kcmp(r3, r4, 0x0, r2, r0) 02:49:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @loopback}}, r1}}, 0x48) 02:49:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfx\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1253.719811] audit: type=1326 audit(1546310968.971:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9740 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7fd0869 code=0x0 02:49:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf%\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x50000000], [], @loopback}}, r1}}, 0x48) 02:49:29 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)='em1em0-ppp1\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r2) 02:49:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') getdents(r0, &(0x7f00000001c0)=""/25, 0xffffffffffffffed) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x15c5], [], @loopback}}, r1}}, 0x48) 02:49:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfo\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf+\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:29 executing program 3: io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) [ 1254.434744] audit: type=1326 audit(1546310969.681:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9740 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7fd0869 code=0x0 02:49:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ipx\x00') preadv(r0, &(0x7f00000001c0), 0x0, 0x0) 02:49:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfec0], [], @loopback}}, r1}}, 0x48) 02:49:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf*\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:29 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x20810000000005, &(0x7f0000000040)=0x0) socket$packet(0x11, 0x2, 0x300) io_submit(r1, 0x0, &(0x7f0000000080)) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x101000, 0x8) name_to_handle_at(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="b8000000c6660000334cb73a98aeb777e359935ce8db41acf9e9f2573d49fb67095d0aaae3f3f1c8a947aea52f98d843d6ec0d21b91c229631545967899a8e57d4f1ac2121e3b5373669574cfdc97b7df9ab800ad959c8c5eca4f065a77a5b9ac670175abfb8119148647f087d245b377bee8770f9fb5e5795f549d8dd3bf2b26abc12d1004891d6ea4da6d35cdde8a42baa7ae3a23340f5c924cba7"], &(0x7f0000000340), 0x1400) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0xffffffffffffff9c, @ANYBLOB="0000000000000000181b0000", @ANYRES32=r0, @ANYBLOB="00818e6a270806a2a2a79debd03ad35c4af17c3bd3348467172635db67e06e4bf1f9b4f2c41a7011899339af24a6db62f179c1ba80fb8d57f981117c5e178de41440b05e"], &(0x7f00000000c0)='GPL\x00', 0x956d, 0x64, &(0x7f0000000100)=""/100, 0x40f00, 0x1, [], 0x0, 0x4}, 0x48) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r4) 02:49:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfd\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') getdents(r0, &(0x7f00000001c0)=""/25, 0xffffffffffffffed) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000], [], @loopback}}, r1}}, 0x48) 02:49:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000000c0)) 02:49:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfc\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x101000) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000180)) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000140)={0x4, 0x9c, 0x3ff}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) 02:49:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfu\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000], [], @loopback}}, r1}}, 0x48) 02:49:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf#\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfo\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000], [], @loopback}}, r1}}, 0x48) 02:49:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r4 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000300)='self\'') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfX\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:30 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7f, 0x2841) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x100000000, 0x9aa, 0x7ff}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x3, 0x8000, 0x3, 0x5, 0x8001, 0x7, 0x3, r3}, &(0x7f0000000180)=0x20) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000280)={{0x1, 0x7, 0x4, 0xfffffffffffffff8, 'syz0\x00', 0x101}, 0x0, 0x10, 0x20, r4, 0x4, 0x167, 'syz0\x00', &(0x7f0000000240)=['\x00', '/dev/dsp#\x00', '/dev/dsp#\x00', '*\x00'], 0x17, [], [0x9, 0x7, 0x549, 0x7e]}) 02:49:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfx\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:30 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400, 0x0) r3 = syz_open_dev$audion(&(0x7f00000014c0)='/dev/audio#\x00', 0x4, 0x800) io_submit(r1, 0x5, &(0x7f0000001540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x38037ee5, r0, &(0x7f0000000100)="ca8efe3e8d0a13b322e9ae00e6ee3ce9b9ccb34b0de8b1089b80ae38af1e5a073cfd3b3b74b9a5f5055cdc", 0x17, 0xfffffffffffffff8, 0x0, 0x1, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f0000000200)="53e7c549d4e25a97c60f265021f8c71e436a03e85cba76f4a13f1ce48104187d128103cc3785a0e0cea58f97f0e820a4790842c63d67a2d86d437524fec3bafc50d8b8da36", 0x45, 0x9, 0x0, 0x1, r2}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x7, 0x80, r2, &(0x7f00000002c0)="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", 0x1000, 0x9, 0x0, 0x2, r2}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f0000001300)="05d49bbd02e2ecb61ec481fd3c137213b3e28e24449c989b19110642505673be5cdc34e48caa601e7f16479947bf5d70484f9b3d0c90be2e07674161067977921bfdb5ae486744e99dbb249b904d920e8fad7437e77b6ac566ccf3a55869a094c2941a67f52096bcaf6f151a977bf7c18fd2432ef5ee05621c9b6a09b41640225f32bc19a3ab4ab7ca4be4665bf29200567bafb25f9dd9e77153", 0x9a, 0x800, 0x0, 0x0, r2}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x1, 0x57, r2, &(0x7f0000001400)="d46ebfd006a87b04bd1e7ff80ea0979201c90c13e9aa82cbaba6c0f09f3a4e44ce7fcef49c858cb756689548927c1cd12ca57b5f594d67672fc4c31cae635eca0f781c4f4a7234baac565ef21cf8f057223a720f8e37b2944a75ad63f023bc6a205205c005816fd38e59a47ead6cf5d7cbde6dfe2e0f2e16a77714be1734857f80af45f1cb6e1f1fd2952a882e445e87330ab49c088019bac4a1f32fe7050507b68cea", 0xa3, 0x0, 0x0, 0x6b63ad8244978fdd, r3}]) socket$can_bcm(0x1d, 0x2, 0x2) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, &(0x7f0000000040)=0x8) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 1255.320755] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1255.386881] Error parsing options; rc = [-22] 02:49:30 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1255.423817] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1255.463000] Error parsing options; rc = [-22] 02:49:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], @loopback}}, r1}}, 0x48) 02:49:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptf0\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="18a7b359e37488471f505a822a20f058e3c3f1c0ce6b326be54318bd02b8eef2"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0) clock_gettime(0xc, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={r1, r2/1000+10000}, 0x8) 02:49:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x800) r3 = dup3(r0, r0, 0x80000) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) r5 = dup2(r0, r0) io_submit(r1, 0x7, &(0x7f00000016c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x100, r0, &(0x7f0000000100)="127993a4403bb860e8cddfbd02f1323fa5261528c47bee4e053830987ba8b0efd161a043b202987034b92a0a46793873035066ef4bf5c101a48b2e1082e0e0a0750d03e31faf38b21f4cfe8ddaf78fd4b389c6cda5ad36f6030921852265d9160eef458590cba44afdd03805", 0x6c, 0x20, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f0000000200)="0454ee4cdd9390f79f25b70cf2ad2cf8ae55bce03430328358ead1c6f3a2ee7d33b6d6106ee73a4c96f6ff2f74f3360d54b577c684dfe505c98704f3a05cedb751a80554f21a33e287ea897b837c3c88f32c0bafe84bfc7e326a8778a6103a710b3af27c4247e9f9519f97c271232f460ab675208b9bf53f5a8cf770e44e44fbbfedcb8bbba67ec7b5c084166b92c7023a417c1de511aafd754d4b2ff69f727fa4a4ce39a008fb8cd02334be5dba5bd2350d8092f63f78cbf070956c7573e1f6f0bdb643bd8820247365110467de06f393e0dbb93265", 0xd6, 0x7ff, 0x0, 0x3, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f0000000340)="dffedc6859e8c898ec0de1058032003a2ab7568d5bbc8494700facc8cbca336b4cfb945fdd1a80fce293914d6762ee163d152338df0c34028be02ba4b831713e032be8a29f2b252a7503a270e9", 0x4d, 0x5, 0x0, 0x1, r4}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x6, r0, &(0x7f0000000440)="cd6a717e5990ddd01d04718b478084a94c5e79a44800cf5869", 0x19, 0x100000000, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x7, 0xf465, r0, &(0x7f00000004c0)="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", 0x1000, 0x42, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000001500)="de3ff137eee82c3ce617e5491ba843bbba0dc79ace6f9ee1da3731d76536462ea43f880aa293a69ae0bf03a1a91e6d1d08133c8393cfa14bbae33a4c4ab874b03148e1309983a46b8ab18bf11c9c8394d0944aa3e3800b06a45299c1bf89454074ced0272aa4ba0825ac69e79be4747c19a00d00a7e17a576a96d6cbbf93d1c58f9152ce037af701272f8d97c082cdb40e531f89314e5495d061", 0x9a, 0x80000001, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x9, 0x0, r0, &(0x7f0000001600)="34a0ff1230738f4d1c18b4821981d09bb131e7607c5eedbc57d3ae2932070c1e84bca25b1a2bc6e4703df8cf42df88a7371c8dd7b39a21c314f870ea2e595009763c66792698eccea7093f0a491c9ba145b01910e065d7fd8cf22a15f6d103", 0x5f, 0x8, 0x0, 0x1, r5}]) io_setup(0x7, &(0x7f00000001c0)=0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r2, &(0x7f0000001700)="c0c4a5d5c346bf717ff9b65bc51a54a9aca7712a0a6f903f23cafcb18ce5541fce249c0e"}, 0x10) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [], @loopback}}, r1}}, 0x48) [ 1255.681548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1255.771064] Error parsing options; rc = [-22] 02:49:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cbc1d8bc356a3cdfc60c7b0003b79b2fd34915a8f47e3ef745143f6440f79c97cb02f2c38b829a88d3c4903fd39fbe8f8eff4fa207bbd1f34146070b2b043910fd736eb8f762ceab50d9dd51bbe700e4e2c8f862d1c2e011a8c1f70e9bad1aa9b0bfe54b30f7"], 0x1}}, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x8, 0x4, 0x7edc9258, 0x200, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x4, 0x5, 0x101, 0x6, 0x7, 0x9, 0x5, r1}, &(0x7f0000000200)=0x20) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000240)={{0x6, 0x3}, {0x8000, 0x7fffffff}, 0x0, 0x0, 0x6}) preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) [ 1255.792810] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1255.810641] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1255.825725] Error parsing options; rc = [-22] [ 1255.832826] Error parsing options; rc = [-22] 02:49:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff], [], @loopback}}, r1}}, 0x48) 02:49:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfp\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:31 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="000001000700"], &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x8}, &(0x7f0000000200)=0xc) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) getresgid(&(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)) 02:49:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r4 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000300)='self\'') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], [], @loopback}}, r1}}, 0x48) [ 1256.044836] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1256.083683] Error parsing options; rc = [-22] [ 1256.110402] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], @loopback}}, r1}}, 0x48) 02:49:31 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x3c1040, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffe5f, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="590e9fc769de5ccc00"], 0x1}}, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000000c0), 0xfa, 0x0) 02:49:31 executing program 3: getsockname(0xffffffffffffff9c, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f00000001c0)={0xffffffff, 0xffff, 0xd2, {0x0, 0x1c9c380}, 0xdc4}) [ 1256.232969] Error parsing options; rc = [-22] 02:49:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x05', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], [], @loopback}}, r1}}, 0x48) 02:49:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1256.405432] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:31 executing program 3: clone(0x70202000, &(0x7f0000000100)="ed567d9436e20b3272345e3530e1723a50a702d35c66a99a1a7e6dc34685b01b425e796b60b11496d501fd638adeaad639d974bad954bd02210daa977ef89cd7ebcc7600b952cc4423f8ce9c8c67f12cf191ad626db7cfe9e2fb49db75c56156c5a265c55ff471477fe14880fad61497c2cc58ac3bca5b2dfb32d4c188e7492da126535d3db5d1c4bbc69c0f45a2475dd9de41ff7642497eb137f2b36a7652c2eeb9e23e0f40f2f8341ceaf3ec841bb5babc8cc4e7325daacab3177dd440c44810200cc61bc7ea8c7a7ba83e17cb2b0a936ab41915dda6dc7b13119ff0b1578574c529664f37ff609cc7ef712a643ff0c2066a8d7fcce7cc4b66618a627b31020b51422e344fc3fc8c12c70db36832e1200f1a918da7cc398bc33dd472965a99d33d75aadd9c71f3b6b620b273609591811a5b065e8bc60b68d811b3803c7ab168fe9319a2097d0461681c9587eda61dea93bc00aaa36a82cd47b99242622b38ec6211a719c97de93d8ba7f14ca0d0d0e704c630c11080569b9fb06c1d0874209cdec4d2320c1403a14c82281ed7c77310fb45c56a7e372074ea35faed3610453b9a003eeb25d8fa0f19fc87cbe00b5ba40eac4cfecaceb8a33281ef7339a3048d5bf1b3cd7a6cd0f446fb8af731b9c0f7b3559deb769b1544154431e567a4626918898bcbbdc41e3b5db8f86160d10eedbbd34229bad45ac7c1ff6539c094c92e3258cc8931068ba06194c83f8740bfa41b20b4cbe368e9fe2dd7032ab6c5e8639edc3200933dafebf613ef19c79890751d74f82624b6684777ae9c91e7c4af3fb7c57ac5f8cf214d6e7fea89681c051025f5ea0d5cb6062536fff7f0b57393746828f3e2b5d6ddb62b7dea73b59c7cdfef366d0ec3639767ab4eee77fdbc122f617027e1d6a6565799023a4bc7dfadf910999d27ef0f35114be30120baaeb23f87fbff1836c25b194287c262df6301d6e9fc6ef6ba0ebaf559f4724d2c37d1fe0ad30b406f124e99ebb37bc688d066d1e5072d7e29a86703c9088471415f5be64b119353bc3b57dce0248ad32cc57e40ab1800ce153b75552e10226fb422bfc7cffae3821cb20976b2b4ece955764f86bbf73ffee6dbd03fb7de690803d050e0b0e13c7bb670e264a76beecf55c0585317b7f210a66fb8c2fd9604a1714c0d569f83c42f2584522f36e9d801d0d786b6a9454547acc51a88aff9e265ba6a275653542a39d1584219ec43b35f229693a38ffab69aafef61a0f4ffef80ce4e70b9559913097fb61a4d885dc24e0d8e3d2c8a67ceb2a8e10f2f694c8276c57948ac8c293ca7a4f4709e2ee16beec6d89846fb87a6a382b990a3d3d5ca248d174f64e891163874a44c469d4b41121dfd1ed6c53a951cc1c6adee4a58d0843aa86c4495b83a3a922c49b486f1275b39b46f562c117b118addaf4211db12c1e471001941ea0325a60f4b8e52b5dc027a10c7ce741cf8ad51d5563bf7a227258d5903aa776ec5ba6bb7d0173a42d69bc2c3c804364ecdb316ccb5f7a9d8515674b82a71dca383afd4c4ab167af6f764727f39c92ae2ad7e047f4c132e9c2299969a06b90e75ce764d38657b1d77386aa57a0e4377071f0da2ba576ff0f06e69250bfa327fc1fa49d75edb57b4e419b6195ec48d2e4ebf37c0e7fd91fc25efa912bccdf4f2052cc781c92f7daf54d6eb93ca896da17737985dab19a79e25d121615a4c016fee6a5b796070bb20bd497fc10af73e9a569fd99b0b0bf7948bc23fce2f2c7f46ec1c6bc2181e47f085a39863e8a27cde32e02a49c83e95978712e109ecf3f6522c29b2d4e5f7f2c9d43ef124e648e916b0e1be346004a583c40208394c0fd1a1805d67bfa06f41ee7268aff6f32be9b1a4ecee62d3ba9a20bfb418fa1daa1315c9a189ee6da8961c34ac7d1bf2f9d589dc7199eb4a19d9269d65ac87324709c30d64ca310df5fec71a86780fe520c1b14e74b4511d771d5a86803c3af65abf25b482d67d841efedbdfbfc42a7d5e12ea71d2a0b99021d9eeb8868a0326b46310f27de5bb1216347ad426bf8199737739374cd98c9c51de7791b99055bb21dcc2cbb108f0a0c406eb5185f3b8f5fedcfb25881a4bdb0064bb0f3e17cd31c34cd8ae5f1e8fb659945557dacfcd0c5cb7e7159ec44cd147879373fc6811ab942ea61ada841eba676c760376d9b9a233ee7ef8cfac6b6488cac793f8cc09734a317a2ce8556280a6a1f0c5d71f065822d40c379c1f2d6d8eb99abff7a2586338c0a2ecde7f1aac87418b471aedcc6a73d62591db2c679eafba712ef590ef1c0c3abf8d0218a837d96b8e02a0e0bd4e00bb26bcbbb69f8749eda0ef3f13d1128f972f7608df6b2235b25f3122430002fb900df26799a2337cc8d72c35337c54ef3ab66d21a66564a69ccfe61df90a3cefde46be718265082645d19d6dbc59875381ed08ae9911f1176e56affb5f0a64fe98e4e1d853c34710b5f659bbaafeb2277d9ef56f60792733b449d4c5577691bef29a97e51f068d4855b94401ed8c9b014fbc14dc208e7b4ff7dc6a5e8f339b1936a6ddb23730376206924724d73306a3a2dde954490cdb20a9881113b9d600b2e5871a0584606e783b2db204a64f32d869c029a25f374cb57e3f3d575a8bfae016f38216284859411ec89e2923dabf60c6034f43af125f90798eb01f1977380522eba04b3678addc5c30910bda2ccc20a13c83247a560ec93760089f3606fcfc413c1c646bb326bc5571134a1c60aa16105aae7c55064ac998fc84aa5126752a781628060cf07e3ecc3a3492a52b5246b3ecaa88a38f5b06ee6057157da17a4804d061bc00b7880e72f5d7eb36566523234c67b856d7e146ec94b61de5285cc511ef709629f09a00216dcf5fc87e2bf5cfe5187da1321dc2c229df048286ff133a8708ed68bce05ac68895fab44a5477db0157e6a2d8f53d4d58183bdccd31e39ec866039f250d40dbb8c628e0eb9a4d8a93e739953ab902ce920782d2b2aceabf7e5feeef317fd448f23ba6680620298630cd0734e2afc5b7213e77e3c60daedfbed3fbae149a2a570d867c288dc169804ed3f5adb71f4ecc2207b111324fa02cd9d8a252e8e4c863f657abf7993ebd9e2d1a9b7f173a68489c8b011686d4813ba235dae3f3b6043bc6f1159a6d32b0ea061940af44c9eacccfda144ff32b0e6c6fa760272ad848a7dda06ae7903111787ad8412822ec3a6da4171aec3851f63115b3005a8954aa1e19caea9a3a17977c7f1016fb8e9737cf078ac96a056e093b8d569be2a958629360979c5e09da81004336a1ff59d44fb07684f5051848ec5cbddaaaa9eae8aa34a713c2398ff4af819438c67dc658c28ab07e1d9f72aa8ce82278073f23820ebb1293f40e6db3fca6d45b7f7c6b8076b0b250cbd9031f56cf64e205386c45b558ff4616abe969b08bc8121c088a3444b2692040522940a6f09b5458561b305a7b7f26ae01440bb861557c38d99e9d6307a04db137f27955b1214443e3d8585931e6c6afdcd6e79a848be5e4ec43833093ebe60b8cd273559b8a514fb95c20261b5edbb4411b13cd4af09322b736f310a9af7dd671e48c724d94df43f54fde41ab81ee347b964f6250e0910907a552eca6a2c31c110f6490aea4861d067acc6471049a2ff4bc4c21f5e615f92a3eb047c3ea75143ed852de5162ff3658876746448762ba4b6a3c6c39c37531828b31d43febc5f9eb9654069ef12a61b717c77a2f5a0f479cca68797100a019395de545389b17167b0e81ee84afc1c33b5dc647fe45ad05152d7bfb58264a85dd2da9920d703a22e3ddcd0879f2ccb24216cb10fc7891012ced76ca39d8d4ea93101efeec8302f860ae2ecb37c0436b695972e6554347b6b7571bff857e297825939e107b705ea975ea84c659578794f9876ddb3d19670f984d3cf4a36f80ff07d8abed482210ece790bc40a62393e60a9bfe5707005b756fb0a12ba068305e5b2fb827de378305bb4f188b0485ba75fcbeaa8db398b75e8943c04e97c7e53561d06499334b18ea231fcab9919d473d240387572463555da46fe9ca5929a4285845c2d5eb5ca24ef39c606e81edc3d0bad6354fed09d55f33032dd085af0726f04e4f9681ba23794d0ad4a307c89b83c392c079a5d037751f558f8131ba51c01d0fac76bd833ab21e5e1ad7b832d1f46fc5d7de3a213373b1d88d4e9db1b849799bd856c07a963173d6795eedb2df140d151ed9108078116614aad59f923fc0d7eacf2299a50e20bad7aeeb64678461e56a49f610c1860a93de9b108f6b748f1f2dcb20445d5aba38d8f42d8ff8c8d71b3732276c6ed01131f3481e96225b6d84a8fe06f755b29267e905534ce4ab1337b489e90da4e660dba2ea9d16ea6aa7b880ee3d799aa34330fd995cd9e8169e9282f67ff70e005a0637ed15aa25bffe7318143007a239c64131e2375f386d997837876e57da911de542ffb14e12f6cb750dc3dbf1b126e66f9894db750ccd0ea0bcb2c09b1cea1736992bca8a1dc2c6c173d983641be5754d7234e1e331f0aa488556f1fe203d851d5aca539b2e63537fa19a17c9ff1a1e0a05df2c3fc7137061401507b0cfc132fbdb50eb5f8dcc1871f35b57742896f31fe7032f8560567b1d9d31ce6747aa244d35d20611aeed628e8efd56674ae36ae760e714025b1eb7a5eb3dc898d65e86a7afa32e0563e25be739351faa6e6731bf60be7fded98ec4c6f68f54493f0b6aea82e88ad1755dd1a7d6c504596c4e5b4a5f6943f49d7e632f265c2b57e0aa3c916df13ccb5ae81e763d6f3ea208fbe8eac27894383d0bca9a726f1b306217a976e35c83a08f97c9c9305e66a5dbdf4c6dfdcd03360988f389209b7773a90faf2a2fe72ba25a412fde0555e60cb4060e370053bd67d15ae7ca48cafee6b9798ae5373d8e0b885a49ef0a5b424da16e30227ec94c405ffe1e29b4f088219f5f4d2137d665db46ee03bfb0d797c2d4490e3ccf7f57b4fb1090aa316c0127ac9db649af6934e9d621738ac914ef51a2f9c883680d8b38e2a25d28666d38789abe954374ae84c6bba497527e41fd422f07d25c210e91e1e478f0710613469f227fcd456a365d121e9a65ae951829f9575fc541986d4cf256d7423cf0ccd5c6df76e13ae570f8af692c9d91fb47a189b19ae315859a813594310355a864dcad73192ddb33e00eb793aa8f7298786770e3f57e927c36a9684ba3cf7d52196c0b8c3bbaee579ae3eda1b14173775d141117ec40adc38cc113b9f8d3b1d5854df50c0e0c452516fde226cfceffde78d1a0207fbabbc76f9dc67821d3807679b21cdebe5373212f175f362a742ced90e1394785cfe6b5124b71a9558ebf727072b3adec80a8689a097476c2d10384b4d11d0c21eb287e904d66da8169f9e1ba120f8f2816234dbba8b99c3622fec27d363892b8c89b22a1ed4cd92b05d86786f2cd046103adac0c6d1eadfde9e3cc5d886e36169fb54999bbbd689ab703e0648070a47cadfb149e7ffbdfb865d13a47331faa4a5e4121fa7253cd20d288cec3e077e8384292b8b4a0e518ef193d8bc80e4b15a5d98e99b3bfe84558708501ecc2a67b4ddf017b06081fc51d4aa5425772d859e8851a589b8f806c04e067d0a3b4f5bc537ead9e00581bfbd76e1121132855f1f5f8cfbdb94e3aedf06a406ef9a934b7caf69e184b0f2c5e42ea03dedd1e8dfc2a2b5140256621e729b394c864048b49f7b0ffcde0b5a6b3d9339415587c26b9bb2480fb2501dacf5d8c1ace829b8a96960723660c9b", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000001100)="542308b37ec04b95ed9afb07b7ba5fd6ee4a9ed597e0daff71877d343addebb5b0fe48c617139ed22c04c1692e3da71a50ce85340cec5f4e1e7d8392dfdc248117d0b623696dff15099fd7629e3ce0cc3e72bfcede3f8ed3efa6c02df8657250cacc060f7fbb9563a04995845d08601f50d16731") r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) fcntl$setlease(r0, 0x400, 0x0) [ 1256.459320] Error parsing options; rc = [-22] 02:49:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r4 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000300)='self\'') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) [ 1256.499332] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1256.523123] Error parsing options; rc = [-22] 02:49:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x06', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], [], @loopback}}, r1}}, 0x48) 02:49:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:31 executing program 3: io_setup(0x9f3, &(0x7f0000000180)=0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x80, 0x0) io_cancel(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x7ff, r1, &(0x7f0000000240)="e8abc9b71983ec231307d2289d2bf1dc761b7889a4748b8ef46e9e868a0819624e8935c6014997f90828aa9e5d6b939f23bb095052cf9203d314f694a3e7ed0640e672d2336dc405f932", 0x4a, 0x4, 0x0, 0x0, r2}, &(0x7f0000000340)) r3 = socket$can_bcm(0x1d, 0x2, 0x2) times(&(0x7f0000000000)) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x4e20, 0x5, @ipv4={[], [], @broadcast}, 0xfe1}, 0x1c) io_setup(0x7, &(0x7f00000001c0)=0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0}]) [ 1256.761341] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @loopback}}, r1}}, 0x48) 02:49:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsz', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1256.850515] Error parsing options; rc = [-22] 02:49:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='-\x00', 0x100003) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x40000) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x3) [ 1256.889603] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:32 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x80000, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x20, 0x501000) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0086401, &(0x7f0000000140)={0xaf, &(0x7f0000000200)=""/175}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x443e, 0x3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040)=0x101, 0x4) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1256.971836] Error parsing options; rc = [-22] 02:49:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r4 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000300)='self\'') preadv(r3, &(0x7f00000017c0), 0x11b, 0x0) 02:49:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\xff', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], [], @loopback}}, r1}}, 0x48) 02:49:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:32 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = fcntl$getown(r0, 0x9) prlimit64(r2, 0xc, &(0x7f0000000040)={0x80, 0x5b08}, &(0x7f0000000100)) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], [], @loopback}}, r1}}, 0x48) [ 1257.318880] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:32 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x88) r0 = socket$can_bcm(0x1d, 0x2, 0x2) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x20000, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0, r2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) [ 1257.372543] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1257.433554] Error parsing options; rc = [-22] [ 1257.447239] Error parsing options; rc = [-22] [ 1257.467755] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0)={0x2, 0x400, 0x2, 0x590f}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/25}, {&(0x7f00000000c0)=""/190, 0xffffffffffffffeb}, {&(0x7f0000000180)=""/187}], 0x3b3, 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000300)) 02:49:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') [ 1257.484240] Error parsing options; rc = [-22] [ 1257.497561] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @loopback}}, r1}}, 0x48) [ 1257.578384] Error parsing options; rc = [-22] 02:49:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x100000000000000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x610401, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x3f00000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000100)=""/196, &(0x7f0000000200)=0xc4) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:32 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000040)=0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000000)=0x2) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') [ 1257.774795] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], @loopback}}, r1}}, 0x48) [ 1257.819038] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1257.843346] Error parsing options; rc = [-22] [ 1257.855816] Error parsing options; rc = [-22] [ 1257.868065] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1257.885129] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') [ 1257.920299] Error parsing options; rc = [-22] 02:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@ipv4={[], [], @broadcast}, r1}, 0x14) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 02:49:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d28c4f76b1feff7637b3d8f3a5e506db3ed229c32dfaf77ee6c5946cdc6e629f1d8cebe7aabebf87b5f4eed6f179e77c00bf5273ed868f7dc618cdf1d180605befbcd833652efe0ecf48aba688f7d9bb2aec2ace4b49886e2d3432ac12c93537cde5f71d43df3caaf56e19bb3924c2beacc75412f767672ccd24464918ddf737b99194afb9e2dbce83072db0b74adab53a5818fe41c8aa160e9a2b3c8ad9f30c978bf0f80e57aa47d7c44c5ed086f9f747611b2c44d30acad300db"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], [], @loopback}}, r1}}, 0x48) 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') [ 1258.090252] Error parsing options; rc = [-22] 02:49:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1258.152990] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1258.193764] Error parsing options; rc = [-22] 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') [ 1258.236825] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:33 executing program 3: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfbce, 0xd942280f50896ae) r0 = socket$can_bcm(0x1d, 0x2, 0x2) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) io_setup(0x7, &(0x7f00000001c0)=0x0) getgid() io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4800], [], @loopback}}, r1}}, 0x48) [ 1258.335321] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1258.346569] Error parsing options; rc = [-22] [ 1258.382142] Error parsing options; rc = [-22] 02:49:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="91c0c658144bd4003cc38bc03a19da0cc74efc1291c278bac84fe4370a493744e22b902f1ed4ba8073fe4538883594679c449abf886cb3ee65ebdca1280c7a3adb267705235d056a07a38f374838965e699959b25e9da791ecca92b9d93cc2c827a4a42f648fa306bd4e6dbb08491d648722bb05ad493681ac3955dbacfa538aa2e97a754af32bf71165597ede350cec1ff1bc282965"], 0x1}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) [ 1258.406680] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') 02:49:33 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000040)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 02:49:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], [], @loopback}}, r1}}, 0x48) [ 1258.517454] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1258.530441] Error parsing options; rc = [-22] [ 1258.544808] Error parsing options; rc = [-22] 02:49:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\a', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1258.591392] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') pkey_alloc(0x0, 0x2) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') [ 1258.677180] Error parsing options; rc = [-22] 02:49:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa], [], @loopback}}, r1}}, 0x48) 02:49:34 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x804}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x2, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x48d4) r5 = fcntl$getown(r0, 0x9) r6 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x3, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x7ff, 0x0, 0x1, 0x101, 0x0, 0xb50, 0xa2000, 0x3, 0x8e, 0x10001, 0x6, 0x9, 0x8, 0x95a, 0x2, 0x8, 0xfffffffffffff624, 0x140000000000000, 0x20, 0x679, 0x7181, 0x200, 0x7, 0x0, 0x3, 0x0, 0x3, 0x7b1, 0x7b75, 0x8000, 0x3, 0x4, 0x800, 0x0, 0x9, 0x100000000, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0x7}, 0x8, 0x1f, 0x0, 0x7, 0x7f, 0x5, 0x7fff}, 0xffffffffffffffff, 0x5, r6, 0x4) kcmp(r2, r5, 0x0, r0, r0) 02:49:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="f3d74364f57d293d189b2bc2630d7f1fd37cb26c9ba5a09d88ca6693fa46f06b5f68e21e"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffff8000, "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", 0x98, 0x0, 0x9, 0x800, 0x3f, 0x0, 0xf8, 0x1}, r1}}, 0x120) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1258.842457] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1258.880710] Error parsing options; rc = [-22] 02:49:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x05', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1258.913803] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') [ 1258.973894] Error parsing options; rc = [-22] 02:49:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x78], [], @loopback}}, r1}}, 0x48) 02:49:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:34 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x9, 0x1ff, 0xffffffffffffff68, 0x2, 0x4}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x7ff}, 0x8) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 02:49:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x06', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1259.188379] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.202658] Error parsing options; rc = [-22] 02:49:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 02:49:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000], [], @loopback}}, r1}}, 0x48) 02:49:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r2, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(r1, &(0x7f0000000180)='net/ip6_tables_matches\x00') syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000300)='self\'') 02:49:34 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfff, 0x9, 0xfffffffffffffffe, 0x81, 0x0, 0x3f, 0x0, 0xcb2c, 0x5, 0x80000001, 0x8, 0x1}) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1259.286397] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.326219] Error parsing options; rc = [-22] 02:49:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) r1 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) recvmsg(r1, &(0x7f0000001740)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/162, 0xa2}, {&(0x7f0000001600)=""/136, 0x88}], 0x4, &(0x7f00000016c0)=""/122, 0x7a}, 0x100) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r2 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000300)='self\'') 02:49:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], [], @loopback}}, r1}}, 0x48) [ 1259.513569] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.582986] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.597458] Error parsing options; rc = [-22] 02:49:34 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1259.627178] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.672853] Error parsing options; rc = [-22] 02:49:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') 02:49:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="a97e24ad38cc1e4ad60c185c723164179063f3d8af8bcbf9523e72d8ab39e2a836b116482cac9db139f48a5943d45920e658eb"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x78000000], [], @loopback}}, r1}}, 0x48) [ 1259.699150] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1259.727930] Error parsing options; rc = [-22] [ 1259.755044] Error parsing options; rc = [-22] 02:49:35 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000200)={0x8, 0x7, 0x0, [{0x5, 0x80000001, 0xd1, 0x3, 0x3, 0x401, 0x3}, {0x101, 0x6, 0x2, 0x10000, 0x7, 0xacb, 0x2}, {0x401, 0x8, 0x10000, 0x100, 0x4, 0x8001, 0x4}, {0xffffffffffffff7f, 0x3e39, 0x6, 0x1000, 0x10000, 0x1, 0x2}, {0xc1, 0x2, 0x4, 0x400000000006, 0x3, 0x8, 0x8}, {0x8, 0x2, 0x1, 0x4, 0x8, 0x0, 0x8}, {0x5, 0x101, 0x7, 0x8, 0x8, 0x80000000, 0x3}]}) 02:49:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') 02:49:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], @loopback}}, r1}}, 0x48) [ 1259.999641] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1260.004963] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:35 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 1260.050353] Error parsing options; rc = [-22] [ 1260.058236] Error parsing options; rc = [-22] 02:49:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="a1cc7a443f88bbb8680562319951b3c1b67f54edd53d85a96526f0c9cad4c6547e3d3eeacf280c8fa91ee1bc4f14d274fb776afc170bd778d31cf9a7ffcdfdfd6ffe33a0ffccd0bd657fcc080881c9aabe8abfd3f87fee965bbf9aa7bc196c62432cb986036e38d8d7e98e92f6f0d96a9f"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') write$UHID_CREATE2(r0, &(0x7f0000000140)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x11, 0x7fffffff, 0x3, 0x8, 0xbb73, 0x7, "60854f6634a84578d1df43e72ece5cd536"}, 0x129) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 02:49:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], @loopback}}, r1}}, 0x48) 02:49:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1260.089483] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1260.103924] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1260.129114] Error parsing options; rc = [-22] 02:49:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x7fff, 0x8000) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') [ 1260.190450] Error parsing options; rc = [-22] 02:49:35 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0x4) 02:49:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\xff', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1260.269128] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') [ 1260.372103] Error parsing options; rc = [-22] 02:49:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], @loopback}}, r1}}, 0x48) [ 1260.420324] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:35 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x26) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000380)={0x90, 0x0, 0x5, {0x4, 0x2, 0x2, 0x8, 0x7, 0x8001, {0x1, 0x40, 0x6d81, 0x11e1, 0xb98, 0x100, 0xffffffffffffff00, 0x9, 0x2, 0x101, 0x0, r3, r4, 0x7, 0x9}}}, 0x90) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000440)={0x9e, 0x1, 'client1\x00', 0xffffffff80000000, "6913f5a671020525", "4a4ff6c539b9358266fbf11013598c40059d6a70a7b6b7371ccb7c425d27b4b5", 0x83, 0xfffffffffffffffe}) accept4$tipc(r5, &(0x7f0000000040), &(0x7f0000000100)=0x10, 0x800) 02:49:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') 02:49:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="8eb8220e0bf2d3a8bd161c3cdfd63ae0101c7f13f371bdd397706e1d4b70e7606947a1b758d15fc0a3541132"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1260.524327] Error parsing options; rc = [-22] 02:49:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\xc0', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000], [], @loopback}}, r1}}, 0x48) 02:49:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x8000, 0x7, 0x0, 0x3, 0x28, 0x8, 0x5b4, 0x7fff, 0x5, 0x0, 0x6, 0x7, 0x5, 0x1, 0x1, 0x10001, 0x400, 0x2, 0x32d, 0x9, 0x80000001, 0x3, 0x2, 0xeb, 0x5, 0x5, 0x9b, 0xffffffffffffffc0, 0x5, 0x10001, 0x3, 0x1ff, 0x5a, 0x5, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x400, 0x51, 0x7, 0xb, 0x40, 0x8, 0x7ff}, 0x0, 0x7, r0, 0x2) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r1 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, 0x0, &(0x7f0000000300)='self\'') 02:49:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x1, 0x0, 0x7, 0x5}, 0xc) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1260.748877] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1260.796625] Error parsing options; rc = [-22] 02:49:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1260.844805] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) write$capi20(r0, &(0x7f0000000200)={0x10, 0x0, 0x8, 0x83, 0x5, 0xfffffffffffffff7}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x101100) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getnetconf={0x14, 0x52, 0x704, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x02', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1260.904837] Error parsing options; rc = [-22] 02:49:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], [], @loopback}}, r1}}, 0x48) 02:49:36 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x3, @broadcast}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x40000, 0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 02:49:36 executing program 4: syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @loopback}}, r1}}, 0x48) 02:49:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x2000, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) write$smack_current(r2, &(0x7f0000000040)='wlan0\xc5vboxnet0\'system](proc!wlan1proc\x00', 0x26) 02:49:36 executing program 4: syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1261.241548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1261.298988] Error parsing options; rc = [-22] [ 1261.329826] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1261.352948] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1261.372289] Error parsing options; rc = [-22] 02:49:36 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)=""/242, 0xf2}, {&(0x7f0000000280)=""/136, 0x88}, {&(0x7f0000000340)=""/216, 0xd8}, {&(0x7f0000000440)=""/235, 0xeb}, {&(0x7f0000000540)=""/83, 0x53}], 0x6, 0x20000000000) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f00000000c0)=0xff, 0x4) [ 1261.378716] Error parsing options; rc = [-22] 02:49:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:36 executing program 4: syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000002940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20c00004}, 0xc, &(0x7f0000002900)={&(0x7f0000000300)={0x25d0, 0x37, 0x2, 0x70bd2d, 0x25dfdbfe, {0x1c}, [@nested={0x133c, 0x79, [@generic="dff71ff1d41172d11a612d2aa2d415976cb9ffe5fffc9286778b8f9513926da09fbf9f73da0869dbad976d772de7e0632acd0120f0b7bd1f19e110e0a235395e04e367c910baa145b5891e63668df6816ea830935878b04c6c0a8e4622a004ba324f94f06e404d8b01127366591cb98cddbdeb02a8e3ad75874987798a1c0094db328c23d673a95ce4f810e719f2d1727b437ddba6567b2e73710de3", @generic="6812a61f2db2d95566ceffabe64a9343e7d7eb55e01e6c62fd15e766b2af6c5749e0eba989b71bf8e1e1f12aae96e5cfe62cc392f4665f978502fc512e7a286239fd545a6bccdda3a6f707510572f41970d06619c76a22d7ef7edb06fdd1832d08a7a45bc4223fea22ac5acc7605ebe42593a430d82656786ec32b7487b7e3d9b302dd60b59c36185d02b9e9b649c84c2eb84103ed01d6f157dcd7d90ec543f74163af10fcbe74eb08c8164c95cb72b162c5265873e9f1549ffb90c534b6f74a3498617f37fb077222a5814147b240932407203ab105a5c340821188a93e7042022288b0828a6caf74fdb3a3b469ef200858", @generic="049ff1c4bad77a32be77973cc9daefabdf511d60a76c3f9824736781591ded21000c61e396dca2222e02874a7740db09f4ae63c7bbb750b8e1e6ae1c174c6f2cc519ab57761866ed10dc8303f250dc57d21bcf3b56106a365dce0687018fae47b0449a02af04d5d090673a6d24c7c6bc6e34c1dfc30777fa099e884a159a8e894d59b8523fdf79172d8a4fb65532ebcb8ee156a795449e54c8aeccef3e7d453830cbe3c5c3ce21b6fb36e8d9658249f7f1d093180a396f31bd01ce82b0bebf59406f1d3faf34df3a30a00f915ae4182c845cc26e0028bb6708cc8fb6ee97467e348e8de9ad341654da1fe133e4a69415ba6e8071d8f088b6911fd36cd023a9a13a488cc9550d9346e9a24e25ebc05dd8aca5e5a74ed93be0bfb5f905e5f96d48238f9d8a6a35b36138282e9ad1ee0e5b614e9863f50a42fc3ee78f6507624284eda124ea104230dad4e17a8a4ea37046a06e76904f86ff7fe0e14eff476f2c83ad4d4942ad64f3c77f5036192d20bd612006aa68015aeb1f64d44f11587aa7e529d131d6c62ab9266661e86836be2445a5463b99446a8d10fcfd707c7ae727522b266758a4e672197d2be7ca4499e81115d472dbcd15d493aa14a7b9407e4ab419c8bf12f3113740b4eb0a75270b83e1992a92c9997baae42615c5a2358abd3e83fdca859a74af724be28091944f4ce3b44dec90a396ea601d264e9a75e79395ecabc65c48b2fe4ef98860371ce01f6815265154dfa2a35eb89b05144c433347c90045e038130df1d80ae991666431695096b1420cac7d66a2cc4c35ba0ba01300258e1b747eb4816d80eab1eeb8e5ccf19c16219db4f79acaf5ead31f159575e692333168cab8bef7771e18da371a0bd4cbaef1afecfc173ae7d18f361b41be6e82e94144a47d1922eb1ec65134849b948c98ec8d16e39b0c157dffb5a5ebe95f509db1b1aa589eec800063cc573ef96dfa62bd690e1dd0e783b2e95af2e09956b0d621dfa2e664fbe582cb80063bb8e8daa7831a6a0b40df3d361f10b594d03b517dd1a81393d86e76cb1ad420564c1fd9a45fca39c9782118d1bf0ed9877caf9813b05fc54ce69705ffb41cbfde84657fc3d196b8e3bc4fc80b11f5db3a60d832650089beddd3ffc72c5ff9646fb8a38c6f4509f37b16be68c1d828ade365f8de805f772300578684ff31db4e205a818196660bfd3445a141ecbad5985920157d656c2f30fae03c191ad5947cee411acb3a810aa3ab7873f07c0411477f3e9b72551926624d35406881a37e4477a30c06e5df4c87a0bb01b151262994b9713db877a92fbef1b77d879fcba226ec8b58d5e1ed38b12a387f3b8048d2f8daec47b73d0f215dd69d211d9ce0091753019f0118d77ccac24a384bf7db4527ec65891ab06eadd49072a2c7a66cde34fa391676eac13c35238fd5def24502fb728173873148463d5246a409e21559f7eb9d512173e0c63359f7fa3ebe3f336773f84c2592b6e3cef998a7593d321c78bdd38a6afbff7c33a304e8c46962eab7a2f2b56e120abab966c6f83ef95527759198b2e46e24f562841d7dd41e75186ee40c0648dedf180a4b2ece0278099bf4006f4666d2450ed28fb37c422e6718c7c4b84260ab7295189584835d82e36943b1d0d54db562c5a4c9f0018d9d3cae1f5877c99b21595d01090e3beb623fde0e61aa0d53d9145d2658bbad675bbfe1379bd21e8b0649b7f16f21b09e545a7fed04aeb8f5a8ecfb1e741084f3add3fb4bd5c18388435d7cf9e4e4365711480fc9c380f222073e85906f9d881fc75c11c91d5a8ab3279c6b94d31010d541bf9d41f5e07cd5449a57630e39ca56f23c083a90424d27425382ac9754dc7d0a3e466e1f5bd2f4a8ac20ee0fd8d5dd794de7b148f824073ca4130f0b117ab4df3e834004c2cb5acddd43833188dfcafe082eaef14030c595cde942481b227d883b34f7f3498cc91a7597fcc69bf6d9136ee4d554d8a1ac675b04eca58e7aa9a227cb88806845b2a5b566102e53ec4435ab904ca8a9ae55ac2c85c5fb4f7401be798bcf79daf95f022c579247aa4f28a637d7382e762873bf0845580795d5c83cef3ccf79b69d580d11ec6369e3122da265a2ff2c9f210e0fcf4f4953b57906962b1872efe2c869678fe51db4e595877d3bddc93a003869cb36fd7648ec2528ea6982fd55762f6ba0604d96cd534c901e14b8772d3c97b9e466f72d002f576737fc545b3b304366ffbf1e44f6d0a0d3584f6632d4a97583625680b161b1a07c495782e2eb5f6e0ec978da379fe0f06dfae23af6c27749fda2131a96cad592c1df57ff1a4b4261a3a65b004239435ae1bcbba2a7ef406e1f80fd4390946df5340c2fe7a1a9df439dace38fa7f08e53e40b8cdf6d7b36d657bc606eccd72792e5995c2021e45b8e1c79a28e09e379249276d7e86fdc7f22d73e1a37a2c115acc831422cd7a775dcfab9cedbd50b84d8032f55b70088bc1649caa22a81e7ec4095100ba953cf01ecd670d473183955421743454a70eab87de9c3c591ee2bf0d1f8c65b493e734854127d295d5632f65380e7cca11ed0740136b55851bcb77df2a0eb9d02bc25e53240a6e0856c3e8523043b32482a1dbfb887c37bb802292d27b11c681929b2c6cb7cc2e7e7f04fe9d067d85b219f3c761296aa350cae47afb6322c97232fd63e4c8e98fa7729cf952c84fee791905c996aa4f72807989716c0641f022ac102c23416cba1ec5269694b6e82f3e1309acde77f42bff39ab96b4233228ecde3304790a33400e3a055b6f190edc80b1262142123ea63e4d62506f6adcdaacfdbb869493c4cd617fd3eb8efbf36161781b049214356bdba8064862d7a2bfadd3768cd6ebcfe30b358d5d4317540a15851fc7d569803f59a6f68ad560190ce14c44ae4187f161a58d8997b1978309d9478b49bbc131ac38165ec07be8f6f239c1bd46dcc0f47a2bcbb9fcaaa94068d9c2f5c47f4420ff629d922b78cb93053a5370ce5282017a9986de7beb4a4ecf931542aeb2f96b3bf5d2fdc7411bad05b5977156ce1b3f7f8cbd9029440d447e50e516c6ef831f59027775926fc63815243ccc0a0ff6964156dfe6837e918b48635fe6b7845976d4c524d0309e594c604d6cc8f09dcb0f81cf6937baad83c155c848f5b794433b74f96ae76e778d1e7ede25755c4b8c77feaa51d197fe7b3697051be1c2788c93a9067ab6b33ecfbef1eb8c160f4e7cd27e564ab0fb76a39070a68586d3f252b1c6dfd8b8067b9cad260c33cad8b9ad03a92fe7ee98c40ccd8783ef1446dbb579a4dbd19ed46434aba5c753bed919675e2f5988deac50bede5262324d8ebb797b27223a3a7e05fbaa0afe16b30481d6416830f632e65cecffe7bc490ef8acfebe5a898c45db9b77b003638a49d7efdadc01116902630f4f887727929eb17a2970c48b58256f4342b724aa134379fae9f117afd66fd7c2b3796c97d608c7927c3e51c17962b90e90680cdb0e8c436f5077f543da237d370bef0e7a41242a2a087e505ca3e4332dc05d4398c5bcea708dd2d2e796643a36c77b9787e3ff0bf68aff087833d34dae407b593325481513e546a26e2d014b6a16eefd04e538e4874298c1b801e1651eb8dc7d4ee989ffee35a2b000d524172f7a793de722551cfae84331f692384df390e77a854f65a8daa082db14bfbd2dd067961d2dd26850ed5ed339d76fd13173f36e8c25d8cf246a7b6c765cbf977d9569f5cf801dde987e12159b1f2771184665e9e133f0f74070ae5053e80313f7631e71994aeec405992187041770298e4c0631b238e4d97b727ea39c803554d01893bb90e79fd7b2be1be963b541f1d8a355b8b3c018a46b4993e6c7e8aff55e035d500b122dad3f4cda8c7dc841916498e4119495eba7f2455977fb0deccd2830624eae28af9c9c6d9fd6d55a6d28d4006edcafc453fdff029cdc55e85eb741ef2988dea929dccc6e8aba0bd74e5d9fa4b6873c59dde5c6bf86c4583aefcc8ef8e01ea4c634912e4319aa9c1af8439ba44de947536c7e90a962e6ed93d83a36c92a27ec866701ee256e498945db72ebfd9f59819933e1a6cdcfdd3984885b47e504741501bcbcc1772c423c5f14b6031a328001f35af6983571cb3582fdb0351513fd7dc04837d305ea533c3586e7782c1eb438fd09c7ed7cf740d09cf61c7a3d2a58a3f4766394e4ed95c5d6bab35acbc29ea9a7aa946998ff841a59f8284eb5a34d650ccf114159f7fe70443e8b90c5c360c3856bf59d1a18dbade6daa4a0b4215b4927249d221bb61df343335c007af796e8b17c1987866ea786bbba44eb8789db7475dd1b807b30fe9ddf5b17c5d2472663ed257d3c2ce67ffdd5fabb94ab93b4f17d8e080fcf3de7110c1f12ea5f4623a76a832f11ac25ec92228f327a531fd5713b5268752b987b5f116715d87734836b01ce8c25c36c00a7b64716dd02ec8c6e66c22868f95681854b65fd7a00b181c30e9bbc9af719dc4311832be58d936077345867e18078b3b1c7bb3bb3d5fc8e72cd35f1027398c577fbe2a4c7dfc23bd21b555aa53c502118406e37907daba67e8cc39ade004163f2756e3848b4c1822ec78633127bbe9a9331cb007eb4af848165f41f91ffba5bd6836825feaf375cabb259718ece912cf31e1058e0a6f5e3842e00a01f90cf429e28a80374a436987e78992ed7a36fc26cc8ad92e841303dab8d1a3855246208d74dd4a92b13324248818a64ba16a964483f776f4478bd285aed15705d594728f50dd947535c9df45c47072f8ca1830b46ff5b5332e93fbfa9d529516b11f7fe53bdd8b8f4f200132c94de9aeab07d77d7f603e6cb938a18e64c4c98d7ffbdbecc7507e4e66a1f565807afc9ffa4a1b5f74b551ed02376dac3d3b2f9114467565789f1f204de0dd914e9cf141670cd220b436ede92573943c5160d0c28750989a5a0abb61c94f1b0b83b398511fa527db3073b61527b44c38589be1e688436e41d80f2001592a22d54d99dc7157c42e6815d6ae0520d637049b57a36ee861f61b9e92a9a861aff99d80a81a5850d36951958ebf2df3732d030291cf2c7c7278a1c54f0fc588b8ea53a6a9e6b925d12d24d05c9657eee73f5d7a487277ed2e2574b22e4181365c4065f8f8a379c03773a7c2869e9c25ae386b5c8608ea5fb5919b7013436dabcb4a42586e0a9ccac0095cdaed5ae8b3c2873f052121ab7d1206b5dd2a198826f588b8674444c6805e6decaeb87e2443c8db6c0eb26b176159133e8767dcf71eff8e816164c2824a9cfb677be9fca69396168eae365f4d7827174d8526a4bd17ed3a7ba973e66057ef69ec51b9e15b6de26b4cf53e7d47c2bd6a58f363310fee5ebcc07edf19f9ed147f8bbd8cca5e6122124ea8acaa04aae41bad2640232c02439458baf102f733ea737b22820bb1821b17e16aba56fa5c661291a878124a790c961a7c65c2f7e7661cacbe7657fa10800100b3e8a205b4cb8f955b53bb814b64b2fb8211615e60fffe5655b7bd4bf09495824602fa9c86b560563143bde8df8e3520f4ee7483215bdc5e254942c781afa50314fcf45ce3ea4d7d3a257f0b1cd8e61058ab6cc21613578aac531f6114f97a378abe491a5af3edbec9422eb3ed220da0dc80ab362f920e83333c9a0a8b1afa2cd3f77b73a2ca82374506794cc795c9e0dc97e50a544fa596adc3935df6b97c9e407300665b33dc303ccf0848fd6348ebc6f1dd7891dd1cde0e455133465c0bf9fbad702e3f6379f72bdcad183e3eb361eb99ee1110", @generic="e3132a48a09680e5b88bb38947cc85cd85dee3d5009e279a95020b75a0844243045f8e3affc644eeb55d4b4b3a56a7f5bbdf77b02532564e9a9059facae233a56c0959dc5782694d52268049bf571b9de9ff5f1efbe932162b605b4a70f007f6e4f171b05b0d9237b1c41bf1f59afda2ae350eca806b034cadfab51a2e110f1edad07d6ef35c366158ca235af13b8809b8edd456be545e73302d380a51cd9bb04467df5362258d6927e56b0aecc12d7e9776aa46d6d65c539add934533ab275d249fef2d0e4ed5ce01fe43621d5b04", @generic="4cb9537f71e3e2853981c5c91f8ae9bbf44b10d8d0569e32083fd1a51ba445ea3d6f33d4dd6d5ebe30bbca3bcbf5e1278241ae55cd61984ae7673927ca8af688d14236da122a589feb0a79b1b8d687673a51b86ceb1cd8124ace330add36a7366e7c99bb87c2cdcf573960bae16482863dd8d23880fefb449404dee5905ae68f365b20ebda233e551db43432d23e1ff5b0e23a12cb9cd0815bb7b08381b06ff63cebbcf2270e9d74bb02571246bc18052f1f4b826bb7344f0069e5bea76a729551c8d3a657b973", @typed={0x8, 0x4d, @u32=0x9}, @typed={0x4, 0x16}, @typed={0x8, 0x39, @pid=r2}]}, @nested={0x10f4, 0x42, [@generic="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", @typed={0x8, 0x1b, @uid=r3}, @generic="e9c73bb2ab5587", @generic="614d24be8ffa8c73a1832d40fdea0478fd2075c7895b81e20f5d8004179d21e9454d9c5214ac08fc4a718177cdf64b952df39dcf3c7ed13c6c170b8c8dc4da9bbb9d28ab8e1a47e0cd312e1622d4b40c3b6236047a3402450d2d9dd567b83b0c8f6ee391b8921af6e8a8ad9201ae58ed4a4ac132e070293efb7a084c469ffc8c6d96e3a9ff38d18787b802fe03c3056bc2eeb36df97221204b3cb2261a2a9df2ea356f8b9d1330eb2b737dca5f97d8e2e7980206902415a3e6983d726a8e7b66e2cee0a7febbd4a68023d30b377d44da42e9193697ab87e57216414a785bb207"]}, @generic="8f93f0348946b7f9422949fa3f4711549ef9505c42bdec5f54a79b24d9284027a8dc6372c54dce781814ea4e4ceec6a9462cee7b55653c7f9d22259b637140ca79b547bcc126885553a71e8259f017658c623f94a29c", @generic="bff7cfd1276590c8c51532c83c39f91b7b8faf0bf62faefc6784105d132d8550f2cf0525115fd8a78c1e7673b3a304321662663c9536a76ec86175884234f3b5933a2c7fb2522a193bac9c83206cea386d446f2c69da8ed9276a5383f0207c754807332ada660719a45faa428d6c6752a0f5cac2b3d6ca2a182667d3ea9054c1c568773d660d6c720ae0809a4b", @nested={0xa8, 0x89, [@generic="b276f8d1282523e4feca5ea3399964bb89af0c69368e3911dda850a0b27ec6eec3fff6d0f141a83e0f41ef099aa0d1c9b35ce3ef0b6264ce34df93116082c9d2eb956f5ff7df55aa6dd678a219a8bbaaaa145e03316e0dbc9d0dd250cbe9346cff53330c2fb23631c46c8296a2bae3632526ef187ac498dfb9ad84b3708b9ee6d0afdc6e7ae78e801c286f10581aed3df7f4f8b1e1406d823af6480345862662020d"]}]}, 0x25d0}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1261.423682] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1261.565324] Error parsing options; rc = [-22] [ 1261.573699] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc0000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1261.606257] Error parsing options; rc = [-22] [ 1261.624149] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], [], @loopback}}, r1}}, 0x48) [ 1261.682036] Error parsing options; rc = [-22] 02:49:37 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6e3, 0x800) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000040)=0x1) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) [ 1261.738071] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1261.813054] Error parsing options; rc = [-22] 02:49:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1261.862461] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], [], @loopback}}, r1}}, 0x48) [ 1261.922058] Error parsing options; rc = [-22] 02:49:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:37 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000100)=0x60) [ 1261.964393] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1262.029724] Error parsing options; rc = [-22] 02:49:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cef4cedc117dfe64e71866e8fabdf4c6a10a0db789733ee8b077f8f94cdc426da3f92735ad8a2eae79ddf54fa49b6e26ab0177ba14dad85a126e29e78c98446b082de22cd336f96e6ae9e9748ebe9e728e1848e85ec1e8c058301b44f3020d4474aa4f65181ef1e4a3667a3018734a2b82c42f4decb1a837a185782fbef864aaf5052acd8b0715"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1262.064987] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1262.103407] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1262.103971] Error parsing options; rc = [-22] 02:49:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1262.186816] Error parsing options; rc = [-22] 02:49:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], [], @loopback}}, r1}}, 0x48) 02:49:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:37 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') ioctl$RTC_PLL_SET(r2, 0x401c7012, &(0x7f0000000040)={0x101, 0x3, 0x4, 0x1, 0x20, 0x3, 0x1}) [ 1262.223709] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10400, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0xe, "3f1997a747751c8c85e8122cfc5a"}, &(0x7f0000000100)=0x32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="a3ab58c9e7b06a612401ac47ee01571a3cb9e7a080aca8b829cdf6a18a8f5055f2423f42a0e6205fbcda95954514308902997fca1d694f8f05a7957af088de5603a32fd1dcec"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1262.331833] Error parsing options; rc = [-22] [ 1262.350731] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1262.406446] Error parsing options; rc = [-22] 02:49:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], [], @loopback}}, r1}}, 0x48) 02:49:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1262.439243] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:37 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x2, &(0x7f00000001c0)=0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x148, 0xa, 0xb, 0x704, 0x70bd2a, 0x25dfdbff, {0x3, 0x0, 0x5}, [@typed={0x80, 0x3, @binary="beaccaa7f658dcb48268ac05da19407bdd86acf497347b494375293df2ffa26b6a755dd702611a2c73495dee61de8fa8d65ab9441000dba9becf280e26874f3a52913dc2efbeebfbaf74fa7e1c516ab87bb0f7c00218e87ccbd4244294477407ac53d65a788deda104cc5e4d3a702a6e4f2225ce65b8f6a1c41a59"}, @nested={0xb4, 0x54, [@generic="30e433ba5f", @generic="b5919d9e0815b2427bf97fb73fe8008c2678007b9f57d89843b52e07efa007a16d2eda2e11879906aabdd7ee5dc30d3c5649063e4e11a14c228a6ac6d5b1972fd1704d258ae40e0eb0436e634b", @generic="28786b6421e82be3dc3e86916415a6afe9578654e953f0ee6803629b305f5384962e68f1c62888103bc65304ceba6c6705a16bc7466a79c00b3898", @generic="6aa84d200eefe72fbd6a2010b9a26c", @typed={0x14, 0x50, @ipv6}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) futex(0x0, 0x400000085, 0x0, 0x0, &(0x7f00000001c0), 0x3ffffffd) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}]) 02:49:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1262.563815] Error parsing options; rc = [-22] 02:49:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsL', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e20, @rand_addr=0xfffffffffffffff7}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) [ 1262.742276] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1262.808182] Error parsing options; rc = [-22] [ 1262.817799] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1262.868475] Error parsing options; rc = [-22] 02:49:38 executing program 3: r0 = socket(0x11, 0x7, 0x401) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @remote}, {0x2, 0x4e22, @broadcast}, 0x48, 0x0, 0x0, 0x0, 0xdc, &(0x7f0000000000)='vxcan1\x00', 0x0, 0xfffffffffffffff9, 0x1}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r3 = dup2(r1, r0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)) ioctl$FICLONE(r1, 0x40049409, r3) 02:49:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], @loopback}}, r1}}, 0x48) 02:49:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x15c50000], [], @loopback}}, r1}}, 0x48) [ 1262.988309] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1263.016242] Error parsing options; rc = [-22] 02:49:38 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x2, 0x1, @thr={&(0x7f0000000280)="0a94440a577bedc715aa65830b33b52d4def304398839ee9a33a0bf52572de2dc77149e4f6472da71d7b7f654bf72cb38475aa837b21189cc6c05e8b0c1f745aea29e08cbe7f3a10143cd9a00137946d8371cdab9cfb340da5b50910a631e717cba76aae76a014032dda8c0363cc0c0fac01ca3b2a8fffdcfb67bb027d924254d81e3b1570e2089aa5d62e22f7221b22e448b13300b50bc07d4689c535babc4d588580ae7d3d0d125a39697dbb9a1c6a80ea56a024b7451dbb4f6558d7cb90aa291ea76a", &(0x7f0000000380)="4f133293d672175467d3e3699b37fc0102039abae183aa58a35991ce141bf63a1735388931f15530ba819b6f7399a4412ecd7455e9b7a8"}}, &(0x7f0000000400)=0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000a40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000100}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xe8, r3, 0x820, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_SOCK={0x4}]}, 0xe8}}, 0x8800) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000480)={{r4, r5+30000000}}, &(0x7f00000004c0)) r6 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$KDGKBTYPE(r6, 0x4b33, &(0x7f0000000000)) ioctl$BLKGETSIZE64(r6, 0x80041272, &(0x7f0000000600)) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, &(0x7f0000000200)={[0xf000, 0x3000, 0xd000, 0x2000], 0x7, 0x0, 0x3}) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000800)=0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000840)={0x1, r7}) connect$rds(r6, &(0x7f0000000500)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) preadv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/92}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/1}, {&(0x7f0000000680)=""/54}, {&(0x7f00000006c0)=""/150}, {&(0x7f0000000780)=""/41}], 0x200000b1, 0x0) [ 1263.073597] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:38 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xffffff24, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 1263.128566] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1263.166223] Error parsing options; rc = [-22] 02:49:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x50], [], @loopback}}, r1}}, 0x48) [ 1263.197178] Error parsing options; rc = [-22] 02:49:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsH', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1263.270206] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1263.313141] Error parsing options; rc = [-22] 02:49:38 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="b1a65a20fd4dafaa980b3ba46a38652bd0"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000140)={{0x5, 0xa6a}, {0x7fff, 0x10000}, 0x100000001, 0x2, 0x5}) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x20, 0x7c58}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000100)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) 02:49:38 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8)=0xeef, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000000, 0x200080) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000100)={'sit0\x00', {0x2, 0x4e20, @rand_addr=0x2ea4}}) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000041e000/0x1000)=nil, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], @loopback}}, r1}}, 0x48) 02:49:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:38 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) sendfile64(r0, r1, &(0x7f0000000100), 0xa8) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x5c280, 0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x10100, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000180), 0x4) 02:49:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1263.557046] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1263.577131] Error parsing options; rc = [-22] 02:49:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], @loopback}}, r1}}, 0x48) 02:49:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfst', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1263.668572] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1263.696100] Error parsing options; rc = [-22] 02:49:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:39 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x400) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0x6e0, 0x10001, 0x3, 0x4, 0x537, 0x10000, 0x3, 0x5, 0x200, 0x8, 0x6, 0x1000, 0x1}, {0x0, 0x3, 0x1, 0x3f, 0x9, 0x9, 0x9, 0x5, 0x4, 0x8, 0x1, 0xda24, 0x4}, {0x5, 0x7ff, 0x1, 0x401, 0x4, 0xe8c, 0x400, 0x9, 0x5, 0xffff, 0x9, 0x8, 0x3ff}]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000240)={@mcast2, r2}, 0x14) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000180)=0x8) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000700)={@local, 0x0}, &(0x7f0000000740)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000780)={@dev={0xfe, 0x80, [], 0x27}, r4}, 0x14) 02:49:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) 02:49:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000180)={0x5, 0x2, 0x1, 0x8, 0x9}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d7276d2ac6140def01f4cd38b210c0244068abd6d36397d92f88628e42193d150a0b127f8be724eb4fc3f255d68916eaeab39c1312d5e21255ce504df24785fe321808e26c8b910d9f4aadc4c9c371c1e79dbe5329c1f525c305a8f03ca4a1bde728679d0f35ccc5abc4d922ee2e21da7564e59bef848049d427ac32ba8220ebf778ac70c77e098dfed9a1552d93b5217b"], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1263.971050] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1264.020539] Error parsing options; rc = [-22] 02:49:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe00], [], @loopback}}, r1}}, 0x48) 02:49:39 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1264.114174] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1264.182123] Error parsing options; rc = [-22] [ 1264.191484] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="17b096d9a7b5f3c5ccbf4778109db3438eeb19a458a701334e58ec4d84054954270fe3a7ee74a340fd676430f83cb00a6c1c77090800000000000000"], 0x1}}, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000100)={'bond_slave_1\x00', 0x1}) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], [], @loopback}}, r1}}, 0x48) [ 1264.252464] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1264.273625] Error parsing options; rc = [-22] 02:49:39 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000300)=""/4096, 0xe6a) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = syz_open_dev$vcsa(0x0, 0xf, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)={"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"}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, 0x0, 0xa0000004, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x9) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffa}, 0x8, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000001500), 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001300)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001400)=0xe8) getgroups(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1264.320843] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1264.343853] Error parsing options; rc = [-22] [ 1264.371383] Error parsing options; rc = [-22] 02:49:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1264.428074] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], @loopback}}, r1}}, 0x48) [ 1264.521529] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1264.577615] Error parsing options; rc = [-22] [ 1264.628690] Error parsing options; rc = [-22] 02:49:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x88', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1264.655309] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], @loopback}}, r1}}, 0x48) [ 1264.705142] Error parsing options; rc = [-22] 02:49:40 executing program 0: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10, 0x80800) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000600)=""/4096, &(0x7f0000000140)=0x1000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000], [], @loopback}}, r1}}, 0x48) 02:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1264.918458] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.006984] Error parsing options; rc = [-22] 02:49:40 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1265.035040] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.054669] Error parsing options; rc = [-22] 02:49:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') arch_prctl$ARCH_GET_CPUID(0x1011) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 02:49:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x15c5], [], @loopback}}, r1}}, 0x48) 02:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', 0x0, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1265.122731] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.196413] Error parsing options; rc = [-22] [ 1265.215719] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:40 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x20050, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000040)={r3}) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1265.257833] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.274344] Error parsing options; rc = [-22] 02:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', 0x0, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1265.310057] Error parsing options; rc = [-22] 02:49:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x600], [], @loopback}}, r1}}, 0x48) [ 1265.354951] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.393766] Error parsing options; rc = [-22] 02:49:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1265.476118] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.489896] Error parsing options; rc = [-22] [ 1265.510248] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:40 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) io_setup(0x7, &(0x7f00000001c0)=0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffe, 0x8000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x200000) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x1, r0, 0x0, 0x10d, 0x0, 0x0, 0x1, r2}]) 02:49:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') r2 = socket$vsock_dgram(0x28, 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') ioctl$sock_proto_private(r2, 0x89ef, &(0x7f0000000480)="dc293d967e943c5880340fe5ed387ab79f8d421a7ed367dee3bd58a9c83d1f5167ec7bce59c1b161959242f85a12a019ffd3471152ccbf98154b2507ef6fe9699254769b7c46f130d785cf1da9cd639033ac9b02da943a18d8fc0f9f3828acaa010bb3e271dfb2669cf3aa1fc9e1d7a10ee1a715a83a95b6f1724129bc620b8cf70326ae4cb7ef8da281a7e8c49459aeddb3f44539cf474531b37c58c8d405e687d0c595c6729594294927d6200565310607bc649eb7f60bba930876516f4812522622987b25fe1b2d91a3ac33f92e11448b0cb31fb1a17ca93eb5c1ffd9b82ec38fae41d863806cf1037f2533b8c51571761ffe8e9fb25e76") sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1b4, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x200, @remote, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xa6af, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xd9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe00000000000}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x29}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc4fa}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}]}]}, 0x1b4}}, 0x8000) preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000440)={@local, 0x1, 0x0, 0x3, 0x4, 0x1, 0x1ff}, 0x20) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000400)='ppp1posix_acl_access$-$\x00', 0x18, 0x3) [ 1265.524497] Error parsing options; rc = [-22] 02:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', 0x0, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1265.621361] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.665054] Error parsing options; rc = [-22] 02:49:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) [ 1265.689257] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1265.703352] Error parsing options; rc = [-22] [ 1265.718489] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000240)="61334f7069d3c77992e9407078591910bc80ec9ad337bb1a6bd9f10624d788c9641ffc5bb818e0effe003ad893a5ebea8363458484f17cf94506ac068801d17df44ba83b9ab01741f8cc7db194b3d15e70540bf3e78bf9a42d0f5f99799d2bf60278f94ca0fd834d169621799462600e304a7de73a2b99f3ddda1091ec73e4133f895e24f06a0c4f7264aa17446080cd9c93641d7d114a2a594de50a076d", 0x9e, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1265.765116] Error parsing options; rc = [-22] [ 1265.799622] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:41 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x400102, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) ioctl$FS_IOC_SETVERSION(r2, 0x40047602, &(0x7f0000000040)=0x9) [ 1265.840215] Error parsing options; rc = [-22] 02:49:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1265.928547] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:41 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x42000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0xc, &(0x7f0000000100)='*-,vmnet0$\\\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r1) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x20440, 0x4) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 02:49:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) [ 1266.044390] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.071337] Error parsing options; rc = [-22] [ 1266.080814] Error parsing options; rc = [-22] [ 1266.129792] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') [ 1266.197370] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.217531] Error parsing options; rc = [-22] 02:49:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x15c5000000000000], [], @loopback}}, r1}}, 0x48) [ 1266.241627] Error parsing options; rc = [-22] 02:49:41 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8502, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0245629, &(0x7f0000000100)={0x0, 0x3, 0x1, [], &(0x7f0000000040)=0x3}) io_setup(0x7, &(0x7f00000001c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc2c45513, &(0x7f0000000200)={{0x1, 0x7, 0x806, 0x0, '\x00', 0x8}, 0x1, [0x10000000, 0x10, 0x6, 0xfff, 0x81, 0x76, 0x1ff, 0x1, 0x74, 0xffffffffffffff01, 0x0, 0x9, 0x100000001, 0x0, 0x1, 0xf69d, 0x7fffffff, 0x2, 0x8382, 0x10000, 0x8, 0xf2, 0x0, 0x4, 0x6, 0x1, 0x1ff, 0x100000001, 0x7, 0x7, 0x100000001, 0x7f, 0x4, 0x9983, 0x4, 0xfffffffffffffff7, 0x6f, 0x87d, 0x400, 0xa9, 0x9, 0x3a3, 0x100000001, 0x3b, 0x100, 0x7, 0xfffffffffffffffe, 0x2, 0x2, 0x1, 0x3, 0x0, 0x0, 0x3ff, 0x3, 0x1, 0x4, 0x8, 0x1f, 0x4cde, 0x6, 0x7ff, 0x5, 0x9, 0x5, 0x7, 0x8, 0x0, 0x4, 0x0, 0x5, 0x862, 0x5, 0x100000001, 0x7f, 0x85, 0xffffffffffffffff, 0xffffffffffff0020, 0x100000000, 0x6, 0x10001, 0x3, 0x1, 0xfff, 0x2f50000000000, 0x7, 0x3f, 0x5, 0x1ff, 0x0, 0xfffffffffffffff8, 0x0, 0x1, 0xcf, 0x0, 0x9d1a, 0xfffffffffffffffd, 0x8001, 0x6, 0x58b, 0x2c6, 0x2634e08e, 0x2, 0x3, 0x5, 0x3, 0x0, 0x7ff, 0x110, 0xff, 0x2, 0x2, 0x0, 0x1, 0x64, 0x6, 0x0, 0x9, 0x7, 0x20, 0x400, 0x1, 0x3, 0x7, 0x3, 0x4, 0x2, 0xffffffffffffffae]}) ioctl$TCXONC(r1, 0x540a, 0x6) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x145000, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x24) preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x8, 0xfffffffffffffffb, 0x3, 0x0, 0x0, [{r2, 0x0, 0x8}, {r2, 0x0, 0x7}, {r0, 0x0, 0x2c3}]}) [ 1266.389564] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.452888] Error parsing options; rc = [-22] 02:49:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:41 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x8502) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000100)) [ 1266.479021] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.500662] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.520739] Error parsing options; rc = [-22] 02:49:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00], [], @loopback}}, r1}}, 0x48) [ 1266.546468] Error parsing options; rc = [-22] 02:49:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x04', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1266.582958] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000e80)="d763ec98de31f5dc47bd7ae5eeceba2e977e432f103b988c19d71150515b1e85734b186237ec9b9430fec0a3117d1440a9c30c12723d46fc4454123028fb5730ac9eb53022e5108d5e6f8fa861b991fcb0123281d4150b0506e8f00c4590b571e43dc126ea669e8e4e2c88f4b8cf4b4540dd7d1bb2981a7fb052afed9c842be23349319c9ef8d893fd656f968ea7e389dc9d942f7a88e123a00f0a215c4281e732e613eeab652fcd162b62bc2d6707625c5d46cefdefc69190f2c3cc9560781c21591b8df9c0887f4c6efd4bc0dba9d990422bc99da74205708160bfaab1b0b1ec814cfec3af29c8f6506c540115c1871c255da471697e83f03269ec8abb0867a224d1045da148a79669e03208672919fc140aa8c4ff0d3e642be95dcec333a9a2fc051f192ded8fcb9b911f77809a7c1374c036c89cb883ec019971f8d6896625162f5aeaa210cf6fd311181bf817fed23908a4615bcba8690fcceec8f92eb500be5c40f62ff070e58c6c6a99f4cf26241e3314a04363d7ba4163ea381a7b3bf8a76fdf359aacbbe058673cc882f08b3343c85d1f9914f81ef6bbaac8ef5f8326f97836f2f3269de8a2371bd9da4f6405b865f1c831508d58d40793be64cc2bf2e6dbd7bcf9d9f71dbfd6a5e294ef555d5297ab5d297a35a1753231c491d74e66a660412c84510e4cdb6e0c966ad63645c6ecafb4c924c922e36dce70c3fc159f5d11bdca4ac8a3cb76c3b616f34457e4ef4686126c00a9aaff6fe93c211c6000dc1d831f1c95a052749318b9c03bc0df7cd8a27cdf974b263843ec7c273b185b2509a9ec0ea1510a0b1f577f6f1ee45445f18187e8284b6eecd6e72efe7aef62bfd2e6d556371365e3f4babc8228c53343ed6c7c8fbb0a48f6ddbdc6b87943723d806b003cd793d67ae575674c5a24fe04b9e11c7c97f10ff38890381fb39d2ae974ea4230267367ae9f1c6359ec1096587b4d4bfdf92c86d8ae7dab8f4b33a1c7de4f5766bf9fb9e0c9bf630aaa0c096f018e70d779894accac73290d77229f8fee36a435bc779a100bc0d9a81bb4ebfbd6dac90da7f21e56fccb4e1851081c58b59714e3973af585a09b3578255873e62b0fac91db58968f4358178f1066b1ff7c3f479beb4c18a74b2fc4e6fbaca32ba6bb2a62210521b3343dca6a7127422c7b9c52a6a88d9b938c44013dae573db8c97b136b92928473f8aa1287d7c009254a4f23cf90beb54e1edf4e581876046c6897e6e3959c3e4e41c37ef02bcbc23863079a691e86a6d916543d60348cb833734908b8c0c4956fecdd4cf1b3803b2e5fa3842d4b07c4210ca4884f1e86d7328ed5450ed89082339c6716910eeccef299717d3c6edfb9f24348717bb57052d5db7f93ba3e79e01dcb01d9de45a2b4794f37291d925ae2b20974f61a99ab6667ec0ecfb82ddb6e55bad4b0392c41ad6431c8ceefab8f945671d6a59e7c57c1814a7dc86470ef0ffc185fff02a3173f4ebde8098688f8176d3425ed07e46eb849abd969c1d08cc14bd910c19b346253036cd33f7c716de190bfcaa8a0a0b7ee2edb2f667670ca700961fd07fd534eb44f7694c5db0f5e09472a0e9e57dfbbaf50ab5cbb23793abe24375b016bb9185321f087b37b83e811d167fa83b9b00b479adadfe631b545bfeac5927b78788fb2c1dc6058aa0acacfb4c66c4c6ad607c52cafe68cac79baf39b093aa2023f8045a919642c7d213d7377ee59ea3e574230bc5f15003847b6d596b00a00ebbf27add341dcbb6a4e14f4c692334e340343a76d5b6cb3c10fa24d6b424194aab7c495da522f3ef52c95890d711d2e9d4ac29a28b17dc5c81b316843d31d65f1d21e1e9fd1a2e487032acfd8bb7b69aa0ead8741dd2ebf8210d2c4c4e15d33642983fda67f4f0f26396a9ccd0cb3b9dc501f5d2ade35e0e76e8fc4de5b0de2faa8bd10a3c5ef13fdb1655011a497752d56c634df5e2325a034a5ed4d9f429daebd90ba2c8ff3f7a66f91e20a54fc41fc185c43f9dd1ae9d481a59b450f3164f5e1f337c3372d868fbf50d84b2ec6d02ad0b6487b3df0cbeb3c8e3ec75fd9f3232bdf2c0f7cd2b61c6b2e08127a5793bb7943edad40ff47c21a608cb53a6c4915091a7b93c3fa7f1fbfed90ecebee6b3578775a211c4a957c2ee383e0a4df2401b43e710711df99ffc8d3c45910cb91b3308ef623af973e1685aec8267588af3c8918b5339a2fba33a7d524ac8b45981b6224f4fa1f645d2201e4479ada955aaf4cc227d678064b52ddf284cd39d878cd1090eaeab54e083c01a8c057a1bcece51dfd848ff2ac258c7703e535b501ac5f51693f5b218e5384ecc0626870a49919449515f2c867a9ae994c1221728c49821d75d96606f9b5c73231ddbb1a1698765e6b60afcc1d965a4262355b0fb8d205adcf2112f29da3f65a2f5a3a4936c424798405", 0x6c1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x3}}, 0x18) [ 1266.666397] Error parsing options; rc = [-22] 02:49:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') 02:49:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000], [], @loopback}}, r1}}, 0x48) 02:49:42 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x80, 0x1) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x1b000000000, 0x10000, 0x7, 0x800, 0x0, 0x8001, 0x401, 0xf28, 0x3, 0x6, 0x7, 0xffffffffffffffff, 0x9, 0x0, 0x8000, 0x3], 0xd005, 0x4080}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x441) 02:49:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1266.855528] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') [ 1266.945193] Error parsing options; rc = [-22] 02:49:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x300], [], @loopback}}, r1}}, 0x48) [ 1266.988221] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1266.988458] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000300)='self\'') 02:49:42 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x20, 0x8502) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000100)) [ 1267.055309] Error parsing options; rc = [-22] [ 1267.067070] Error parsing options; rc = [-22] 02:49:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x500], [], @loopback}}, r1}}, 0x48) [ 1267.154432] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1267.192194] Error parsing options; rc = [-22] [ 1267.260702] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1267.307076] Error parsing options; rc = [-22] [ 1267.328205] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1267.375456] Error parsing options; rc = [-22] 02:49:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') recvfrom(r0, &(0x7f0000000240)=""/115, 0x73, 0x40010041, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @rand_addr=0x8}, 0x1, 0x0, 0x3, 0x4}}, 0x80) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00', 0xea, "6935069f2a61e4bfce5514e6a7c4197253ada4ab962322543a36d2058e77db99a18a379b71c7410d2efe1f848b44d4b9df08273211bfccb380fc946a8988b79b77a51ded80fe215ec0492bde3db32bc484042d1772f54a5f87730bd1c48a397002470ba89a613827d0a2b4e99a13f64ec2eef1c5078bfadeb54348278aea348e2a7b035b3caeb907f4c289803bf03b9c27e88c3c26014973f28e13c12aee59c69be323b873cbc32a59e69e457b3580462cde788fa0c1029c27f9774e8cd3382e170b3aaa484e283c57f3bf37e283d5e79106b3c1ae6e9615191146cd26fb8dd9aa3852e97522f97fb980"}, &(0x7f0000000200)=0x10e) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 02:49:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe], [], @loopback}}, r1}}, 0x48) 02:49:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x03', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], @loopback}}, r1}}, 0x48) [ 1267.501696] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) [ 1267.578512] Error parsing options; rc = [-22] 02:49:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) [ 1267.625541] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], [], @loopback}}, r1}}, 0x48) [ 1267.752242] Error parsing options; rc = [-22] 02:49:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x20, 0x8, 0x2, 0x0, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r1, 0x68, "91b0ce7aa5db6b5f2ba5602cf5f24a0fcdacc3bba829944ef653afbcc06fdf5421b5986d25ab6610a3500918c98813bb198218bbb22c22f1d185320ee9abab1acc01f1331a6a9516825de842515d2fbccafc4ebbccfb0572ddff16801a4df8a5253429aa713caef1"}, &(0x7f00000001c0)=0x70) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x13, 0x8, 0xbb55, 0x76998d4, r1}, &(0x7f0000000240)=0x10) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) rt_sigprocmask(0x3, &(0x7f0000000000)={0xc2e}, 0x0, 0x8) [ 1267.845551] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1267.876425] Error parsing options; rc = [-22] 02:49:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], @loopback}}, r1}}, 0x48) 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], @loopback}}, r1}}, 0x48) 02:49:43 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000300)=""/4096, 0xe6a) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = syz_open_dev$vcsa(0x0, 0xf, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)={"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"}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, 0x0, 0xa0000004, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x9) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffa}, 0x8, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000001500), 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001300)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001400)=0xe8) getgroups(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 1268.018452] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:43 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000300)=""/4096, 0xe6a) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = syz_open_dev$vcsa(0x0, 0xf, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000140)={"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"}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, 0x0, 0xa0000004, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x9) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffa}, 0x8, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000001500), 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001300)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001400)=0xe8) getgroups(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @loopback}}, r1}}, 0x48) [ 1268.065277] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1268.122080] Error parsing options; rc = [-22] [ 1268.156409] Error parsing options; rc = [-22] 02:49:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1268.199461] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], [], @loopback}}, r1}}, 0x48) 02:49:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="e240d8d113dfcb0dee0b8305d308d202211734c1ee86514a6b151fe0317d2a9bdcc00c60d431ad1c51a9e85d6615bd04c7d3f4fcdb71b2a6c7dfa67762911f01b6eb13bd54b96b6b8303427d567c4162189b3d68a78a1ea66ea71c3885fdd9e066345dec41386391c60198"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) mq_notify(r0, &(0x7f0000000140)={0x0, 0x1, 0x44000000001, @tid=r1}) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1268.325979] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1268.396375] Error parsing options; rc = [-22] [ 1268.402284] Error parsing options; rc = [-22] 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], @loopback}}, r1}}, 0x48) 02:49:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x8c', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1268.479662] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xc) [ 1268.546544] Error parsing options; rc = [-22] 02:49:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x88', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000], [], @loopback}}, r1}}, 0x48) 02:49:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x50], [], @loopback}}, r1}}, 0x48) [ 1268.779112] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1268.854254] Error parsing options; rc = [-22] 02:49:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000], [], @loopback}}, r1}}, 0x48) 02:49:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x88', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1268.975373] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x2, 0x1, @thr={&(0x7f0000000280)="0a94440a577bedc715aa65830b33b52d4def304398839ee9a33a0bf52572de2dc77149e4f6472da71d7b7f654bf72cb38475aa837b21189cc6c05e8b0c1f745aea29e08cbe7f3a10143cd9a00137946d8371cdab9cfb340da5b50910a631e717cba76aae76a014032dda8c0363cc0c0fac01ca3b2a8fffdcfb67bb027d924254d81e3b1570e2089aa5d62e22f7221b22e448b13300b50bc07d4689c535babc4d588580ae7d3d0d125a39697dbb9a1c6a80ea56a024b7451dbb4f6558d7cb90aa291ea76a", &(0x7f0000000380)="4f133293d672175467d3e3699b37fc0102039abae183aa58a35991ce141bf63a1735388931f15530ba819b6f7399a4412ecd7455e9b7a8"}}, &(0x7f0000000400)=0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000a40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000100}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xe8, r3, 0x820, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_SOCK={0x4}]}, 0xe8}}, 0x8800) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000000480)={{r4, r5+30000000}}, &(0x7f00000004c0)) r6 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$KDGKBTYPE(r6, 0x4b33, &(0x7f0000000000)) ioctl$BLKGETSIZE64(r6, 0x80041272, &(0x7f0000000600)) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, &(0x7f0000000200)={[0xf000, 0x3000, 0xd000, 0x2000], 0x7, 0x0, 0x3}) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000800)=0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000840)={0x1, r7}) connect$rds(r6, &(0x7f0000000500)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) preadv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/92}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/1}, {&(0x7f0000000680)=""/54}, {&(0x7f00000006c0)=""/150}, {&(0x7f0000000780)=""/41}], 0x200000b1, 0x0) [ 1269.019327] Error parsing options; rc = [-22] 02:49:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="892728275ed017631bc38a9b254f25834cc07d033f34cff60e2b9f1420846f9ee771669e73059719f56f907838e32b7036bdf50c37a1ae5f6d9e3ed7fe56eaf0312a7664a4319d641b8452de18a4bc6c04bf6150394a9a25a68a12a7e4c6a0f66d795e7a87188620d85f43721d696c8d5a42c5dc7801b54e6082ffde9d66ef948f13d1ddc6a3bd897e158c7577164cc26a4a43026274418582e3c1bdc461e2e106086486182e3fac6c11a5729412b85cac4807ad000000000000000000000000"], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) [ 1269.044236] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7800], [], @loopback}}, r1}}, 0x48) [ 1269.094756] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\xff', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1269.158396] Error parsing options; rc = [-22] [ 1269.174146] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.194250] Error parsing options; rc = [-22] [ 1269.200507] Error parsing options; rc = [-22] 02:49:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], [], @loopback}}, r1}}, 0x48) [ 1269.365419] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.400904] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.422315] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.443990] Error parsing options; rc = [-22] [ 1269.450313] Error parsing options; rc = [-22] 02:49:44 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x4, 0x24002) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x1}, 0x18, {0x2, 0x4e22, @multicast1}, 'bcsf0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="c9fd9708ab4c8d000000"], 0x1}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @broadcast}, &(0x7f00000000c0)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@mcast1, @mcast1, @mcast2, 0x101, 0x1f, 0x9, 0x400, 0x9, 0x1, r1}) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r2, &(0x7f00000017c0), 0x11b, 0x0) 02:49:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1269.465566] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.479787] Error parsing options; rc = [-22] [ 1269.499487] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.500301] Error parsing options; rc = [-22] 02:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48], [], @loopback}}, r1}}, 0x48) [ 1269.578432] Error parsing options; rc = [-22] 02:49:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1269.627769] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.666663] Error parsing options; rc = [-22] [ 1269.708837] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.765617] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.770310] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1269.787088] Error parsing options; rc = [-22] [ 1269.800763] Error parsing options; rc = [-22] 02:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [], @loopback}}, r1}}, 0x48) [ 1269.823393] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfp\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1269.876699] Error parsing options; rc = [-22] [ 1269.881676] Error parsing options; rc = [-22] 02:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfX\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1269.928614] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1269.988349] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1270.036325] Error parsing options; rc = [-22] 02:49:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], @loopback}}, r1}}, 0x48) [ 1270.063844] Error parsing options; rc = [-22] 02:49:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1270.109052] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1270.176908] Error parsing options; rc = [-22] 02:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryp%fs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r0, &(0x7f0000000000), 0x112, 0x0) [ 1270.200160] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry\x8btfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1270.271802] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x50000000], [], @loopback}}, r1}}, 0x48) [ 1270.315596] Error parsing options; rc = [-22] [ 1270.356122] Error parsing options; rc = [-22] 02:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecry%tfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1270.376516] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1270.412061] Error parsing options; rc = [-22] 02:49:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], [], @loopback}}, r1}}, 0x48) 02:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\nptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1270.521167] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecr\x8bptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1270.586363] Error parsing options; rc = [-22] 02:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\x8bryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], [], @loopback}}, r1}}, 0x48) 02:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='e\x8bryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1270.675055] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1270.688163] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r3}}, 0xc) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) mq_unlink(&(0x7f0000000240)='\x00') r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0xa0000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000040)=""/54) [ 1270.782938] Error parsing options; rc = [-22] [ 1270.801990] Error parsing options; rc = [-22] [ 1270.854671] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], [], @loopback}}, r1}}, 0x48) 02:49:46 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xbbc, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="7112b6dcbb15f4f2ef99c5b29c89d7c6636fef2734c2d91e79afe0fec140ff7d50e193800ebf16c98ced6c9f6e926973389055183ba4bca6807669d879831eb720f9ebff1be31ef59d04d3ec213c9f38718d3e0d10a7160c97a1813af17079d8c437324d"], 0x1}}, 0x0) rt_sigpending(&(0x7f0000000180), 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x11b, 0x0) 02:49:46 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x1006, &(0x7f00000001c0)=0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x200, r3, 0x6, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x71d}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @local, 0x4a5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x100000000, @empty, 0xf64}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8cea}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x685}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffff9, @empty, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x2cf6}}}}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x93}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}]}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x40040c0}, 0x4) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 02:49:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1270.902734] Error parsing options; rc = [-22] [ 1270.949984] Unknown ioctl -2122820351 02:49:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1271.007277] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.056390] Error parsing options; rc = [-22] 02:49:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000], [], @loopback}}, r1}}, 0x48) [ 1271.092013] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.108737] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.108910] Error parsing options; rc = [-22] 02:49:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], @loopback}}, r1}}, 0x48) [ 1271.155869] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.205883] Error parsing options; rc = [-22] 02:49:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsL', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1271.251607] Error parsing options; rc = [-22] 02:49:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x01', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1271.285450] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.311346] Error parsing options; rc = [-22] 02:49:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], @loopback}}, r1}}, 0x48) 02:49:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x4800], [], @loopback}}, r1}}, 0x48) 02:49:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], @loopback}}, r1}}, 0x48) 02:49:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1271.546281] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], @loopback}}, r1}}, 0x48) [ 1271.586454] Error parsing options; rc = [-22] 02:49:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x20010010], [], @loopback}}, r1}}, 0x48) 02:49:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], @loopback}}, r1}}, 0x48) [ 1271.717629] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.751014] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:47 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1271.769747] Error parsing options; rc = [-22] [ 1271.778349] Error parsing options; rc = [-22] [ 1271.787236] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.805035] Error parsing options; rc = [-22] 02:49:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], @loopback}}, r1}}, 0x48) 02:49:47 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1271.864178] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1271.902929] Error parsing options; rc = [-22] [ 1271.934445] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x1e', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1271.991025] Error parsing options; rc = [-22] 02:49:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10000120], [], @loopback}}, r1}}, 0x48) [ 1272.031068] FAULT_INJECTION: forcing a failure. [ 1272.031068] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.060432] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1272.113447] Error parsing options; rc = [-22] [ 1272.126979] CPU: 1 PID: 11486 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1272.133843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.143204] Call Trace: [ 1272.145807] dump_stack+0x1db/0x2d0 [ 1272.149459] ? dump_stack_print_info.cold+0x20/0x20 [ 1272.154486] ? __lock_acquire+0x572/0x4a30 [ 1272.158741] should_fail.cold+0xa/0x15 [ 1272.162638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1272.167760] ? ___might_sleep+0x1e7/0x310 [ 1272.171915] ? arch_local_save_flags+0x50/0x50 [ 1272.176531] __should_failslab+0x121/0x190 [ 1272.180773] should_failslab+0x9/0x14 [ 1272.184580] kmem_cache_alloc+0x2be/0x710 [ 1272.188738] ? __might_sleep+0x95/0x190 [ 1272.192726] __anon_vma_prepare+0xc2/0x760 [ 1272.196969] ? print_usage_bug+0xd0/0xd0 [ 1272.201038] ? anon_vma_fork+0x880/0x880 [ 1272.205106] ? print_usage_bug+0xd0/0xd0 [ 1272.209193] do_huge_pmd_anonymous_page+0x1186/0x1840 [ 1272.214387] ? __lock_acquire+0x572/0x4a30 [ 1272.218635] ? __thp_get_unmapped_area+0x190/0x190 [ 1272.223576] ? mark_held_locks+0x100/0x100 [ 1272.227819] ? mark_held_locks+0x100/0x100 [ 1272.232062] ? mark_held_locks+0x100/0x100 [ 1272.236302] ? pud_val+0x85/0x100 [ 1272.239759] ? pmd_val+0x100/0x100 [ 1272.243308] ? __might_fault+0x12b/0x1e0 [ 1272.247820] __handle_mm_fault+0x38e7/0x5690 [ 1272.252248] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1272.257102] ? check_preemption_disabled+0x48/0x290 [ 1272.262128] ? handle_mm_fault+0x3cc/0xc80 [ 1272.266391] ? lock_downgrade+0x910/0x910 [ 1272.270547] ? kasan_check_read+0x11/0x20 [ 1272.274706] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1272.279991] ? rcu_read_unlock_special+0x380/0x380 [ 1272.284940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1272.290485] ? check_preemption_disabled+0x48/0x290 [ 1272.295518] handle_mm_fault+0x4ec/0xc80 [ 1272.299592] ? __handle_mm_fault+0x5690/0x5690 [ 1272.304181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.309728] ? vmacache_update+0x114/0x140 [ 1272.313981] __do_page_fault+0x5da/0xd60 [ 1272.318068] do_page_fault+0xe6/0x7d8 [ 1272.321879] ? vmalloc_sync_all+0x30/0x30 [ 1272.326034] ? find_held_lock+0x35/0x120 [ 1272.330101] ? __might_fault+0x12b/0x1e0 [ 1272.334179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1272.339046] page_fault+0x1e/0x30 [ 1272.342508] RIP: 0010:__get_user_4+0x21/0x30 [ 1272.346932] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 1272.365850] RSP: 0018:ffff8880631e7d98 EFLAGS: 00010206 [ 1272.371217] RAX: 00000000200001c3 RBX: 0000000000000007 RCX: ffffc90006603000 [ 1272.379022] RDX: ffffffffffffffff RSI: ffffffff81b400a3 RDI: 0000000000000286 [ 1272.386297] RBP: ffff8880631e7e30 R08: ffff888098f04500 R09: 0000000000000001 [ 1272.393570] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880631e7f58 [ 1272.400842] R13: 1ffff1100c63cfb5 R14: 00000000200001c0 R15: 00000000f7f81869 [ 1272.408138] ? __might_fault+0x1a3/0x1e0 [ 1272.412214] ? __ia32_compat_sys_io_setup+0xc3/0x4e0 [ 1272.417326] ? entry_SYSENTER_compat+0x70/0x7f [ 1272.421916] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1272.426516] ? __do_page_fault+0x3f1/0xd60 [ 1272.430778] do_fast_syscall_32+0x333/0xf98 [ 1272.435114] ? do_int80_syscall_32+0x880/0x880 [ 1272.439699] ? trace_hardirqs_off+0x310/0x310 [ 1272.444200] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1272.449139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.454682] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1272.459712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1272.464597] entry_SYSENTER_compat+0x70/0x7f [ 1272.469008] RIP: 0023:0xf7f81869 [ 1272.472384] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1272.491286] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1272.499002] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1272.506273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 02:49:47 executing program 0 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1272.513548] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1272.520818] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1272.528087] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsh', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1272.558857] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1272.589066] Error parsing options; rc = [-22] 02:49:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe], [], @loopback}}, r1}}, 0x48) 02:49:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1272.716568] FAULT_INJECTION: forcing a failure. [ 1272.716568] name failslab, interval 1, probability 0, space 0, times 0 [ 1272.755600] CPU: 1 PID: 11512 Comm: syz-executor0 Not tainted 4.20.0+ #2 [ 1272.762489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.771852] Call Trace: [ 1272.774470] dump_stack+0x1db/0x2d0 [ 1272.778124] ? dump_stack_print_info.cold+0x20/0x20 [ 1272.783149] ? print_usage_bug+0xd0/0xd0 [ 1272.787235] should_fail.cold+0xa/0x15 [ 1272.791141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1272.796261] ? ___might_sleep+0x1e7/0x310 [ 1272.800416] ? arch_local_save_flags+0x50/0x50 [ 1272.805031] __should_failslab+0x121/0x190 [ 1272.809280] should_failslab+0x9/0x14 [ 1272.813085] kmem_cache_alloc+0x2be/0x710 [ 1272.817257] vm_area_dup+0x7a/0x230 [ 1272.820889] ? vm_area_alloc+0x1d0/0x1d0 [ 1272.824972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1272.830518] ? may_expand_vm+0x1c7/0x8b0 [ 1272.834629] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1272.839659] __split_vma+0xad/0x570 [ 1272.843293] ? find_vma+0x30/0x170 [ 1272.846843] __do_munmap+0xc7a/0xed0 [ 1272.850564] ? __check_object_size+0xa3/0x77a [ 1272.855065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.860609] ? check_preemption_disabled+0x48/0x290 [ 1272.865639] mmap_region+0x698/0x1ca0 [ 1272.869455] ? get_pid_task+0xd4/0x190 [ 1272.873381] ? __x64_sys_brk+0x8f0/0x8f0 [ 1272.877485] ? arch_get_unmapped_area+0x730/0x730 [ 1272.882338] ? rcu_read_unlock_special+0x380/0x380 [ 1272.887281] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1272.892302] ? cap_mmap_addr+0x4f/0x130 [ 1272.896283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.901824] ? security_mmap_addr+0x7f/0xb0 [ 1272.906161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1272.911702] ? get_unmapped_area+0x295/0x3b0 [ 1272.916122] do_mmap+0xa09/0x1220 [ 1272.919593] ? mmap_region+0x1ca0/0x1ca0 [ 1272.923658] ? vm_mmap_pgoff+0x1ad/0x2b0 [ 1272.927729] ? down_read_killable+0x150/0x150 [ 1272.932232] ? security_mmap_file+0x1a7/0x1e0 [ 1272.936739] vm_mmap_pgoff+0x20b/0x2b0 [ 1272.940647] ? vma_is_stack_for_current+0xd0/0xd0 [ 1272.945506] ? __sb_end_write+0xd9/0x110 [ 1272.949591] ksys_mmap_pgoff+0x102/0x650 [ 1272.953666] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1272.958426] ? trace_hardirqs_on+0xbd/0x310 [ 1272.962755] ? __ia32_sys_read+0xb0/0xb0 [ 1272.966826] ? entry_SYSENTER_compat+0x70/0x7f [ 1272.971414] ? trace_hardirqs_off_caller+0x300/0x300 [ 1272.976554] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 1272.981067] do_fast_syscall_32+0x333/0xf98 [ 1272.985402] ? do_int80_syscall_32+0x880/0x880 [ 1272.989992] ? trace_hardirqs_off+0x310/0x310 [ 1272.994493] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1272.999430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.004980] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1273.010011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.014871] entry_SYSENTER_compat+0x70/0x7f [ 1273.019280] RIP: 0023:0xf7fd0869 [ 1273.022652] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1273.041565] RSP: 002b:00000000f5fab0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 1273.049275] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000e73000 [ 1273.056550] RDX: 0000000000000000 RSI: 0000000000000032 RDI: 00000000ffffffff 02:49:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\xf0', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1273.063818] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1273.071092] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1273.078362] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1273.099044] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.146461] Error parsing options; rc = [-22] 02:49:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], [], @loopback}}, r1}}, 0x48) 02:49:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x3, r0, 0x0, &(0x7f0000000300)='self\'') [ 1273.179024] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.275823] Error parsing options; rc = [-22] 02:49:48 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:48 executing program 0 (fault-call:3 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 02:49:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], [], @loopback}}, r1}}, 0x48) 02:49:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x4, r0, 0x0, &(0x7f0000000300)='self\'') [ 1273.470436] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.498617] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.503503] FAULT_INJECTION: forcing a failure. [ 1273.503503] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.525061] Error parsing options; rc = [-22] [ 1273.530593] CPU: 0 PID: 11562 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1273.531636] Error parsing options; rc = [-22] [ 1273.537445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.537451] Call Trace: [ 1273.537477] dump_stack+0x1db/0x2d0 [ 1273.537499] ? dump_stack_print_info.cold+0x20/0x20 [ 1273.537518] ? percpu_ref_put_many+0x129/0x270 [ 1273.537543] should_fail.cold+0xa/0x15 [ 1273.537562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1273.537585] ? ___might_sleep+0x1e7/0x310 [ 1273.537601] ? arch_local_save_flags+0x50/0x50 [ 1273.547377] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.551475] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1273.551501] __should_failslab+0x121/0x190 [ 1273.554427] Error parsing options; rc = [-22] [ 1273.557696] should_failslab+0x9/0x14 [ 1273.557712] kmem_cache_alloc+0x2be/0x710 [ 1273.557738] __anon_vma_prepare+0x3ca/0x760 [ 1273.557754] ? print_usage_bug+0xd0/0xd0 [ 1273.557769] ? anon_vma_fork+0x880/0x880 [ 1273.557785] ? print_usage_bug+0xd0/0xd0 [ 1273.557811] do_huge_pmd_anonymous_page+0x1186/0x1840 [ 1273.602386] ? __lock_acquire+0x572/0x4a30 [ 1273.619032] ? __thp_get_unmapped_area+0x190/0x190 [ 1273.619052] ? mark_held_locks+0x100/0x100 [ 1273.619067] ? mark_held_locks+0x100/0x100 [ 1273.619083] ? mark_held_locks+0x100/0x100 [ 1273.642367] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.644961] ? pud_val+0x85/0x100 [ 1273.644976] ? pmd_val+0x100/0x100 [ 1273.644992] ? __might_fault+0x12b/0x1e0 [ 1273.650297] Error parsing options; rc = [-22] [ 1273.654176] __handle_mm_fault+0x38e7/0x5690 [ 1273.654202] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1273.654219] ? check_preemption_disabled+0x48/0x290 [ 1273.681870] FAULT_INJECTION: forcing a failure. [ 1273.681870] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.681955] ? handle_mm_fault+0x3cc/0xc80 [ 1273.699719] ? lock_downgrade+0x910/0x910 [ 1273.715902] ? kasan_check_read+0x11/0x20 [ 1273.715931] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1273.715957] ? rcu_read_unlock_special+0x380/0x380 [ 1273.715978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1273.715994] ? check_preemption_disabled+0x48/0x290 [ 1273.716017] handle_mm_fault+0x4ec/0xc80 [ 1273.716035] ? __handle_mm_fault+0x5690/0x5690 [ 1273.757879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.763443] ? vmacache_update+0x114/0x140 [ 1273.767701] __do_page_fault+0x5da/0xd60 [ 1273.769847] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1273.771780] do_page_fault+0xe6/0x7d8 [ 1273.771802] ? vmalloc_sync_all+0x30/0x30 [ 1273.771818] ? find_held_lock+0x35/0x120 [ 1273.771835] ? __might_fault+0x12b/0x1e0 [ 1273.771865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.800324] Error parsing options; rc = [-22] [ 1273.805052] page_fault+0x1e/0x30 [ 1273.805071] RIP: 0010:__get_user_4+0x21/0x30 02:49:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1273.805088] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 1273.805097] RSP: 0018:ffff88809337fd98 EFLAGS: 00010206 [ 1273.805110] RAX: 00000000200001c3 RBX: 0000000000000007 RCX: ffffc90006603000 [ 1273.805126] RDX: ffffffffffffffff RSI: ffffffff81b400a3 RDI: 0000000000000286 [ 1273.832796] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs`', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1273.836352] RBP: ffff88809337fe30 R08: ffff88805cc4c200 R09: 0000000000000001 [ 1273.836362] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88809337ff58 [ 1273.836372] R13: 1ffff1101266ffb5 R14: 00000000200001c0 R15: 00000000f7f81869 [ 1273.836403] ? __might_fault+0x1a3/0x1e0 [ 1273.836424] ? __ia32_compat_sys_io_setup+0xc3/0x4e0 [ 1273.836440] ? entry_SYSENTER_compat+0x70/0x7f [ 1273.836454] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1273.836470] ? __do_page_fault+0x3f1/0xd60 [ 1273.836496] do_fast_syscall_32+0x333/0xf98 [ 1273.847942] Error parsing options; rc = [-22] [ 1273.849128] ? do_int80_syscall_32+0x880/0x880 [ 1273.849143] ? trace_hardirqs_off+0x310/0x310 [ 1273.849163] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1273.935777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.941329] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1273.946366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.951229] entry_SYSENTER_compat+0x70/0x7f [ 1273.955650] RIP: 0023:0xf7f81869 02:49:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], [], @loopback}}, r1}}, 0x48) [ 1273.959119] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1273.978028] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1273.985744] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1273.993016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1274.000292] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1274.007568] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1274.014846] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfsl', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1274.039244] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1274.078727] CPU: 1 PID: 11565 Comm: syz-executor0 Not tainted 4.20.0+ #2 [ 1274.085618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.094979] Call Trace: [ 1274.097587] dump_stack+0x1db/0x2d0 [ 1274.101241] ? dump_stack_print_info.cold+0x20/0x20 [ 1274.102534] Error parsing options; rc = [-22] [ 1274.106267] ? __split_vma+0xad/0x570 [ 1274.106283] ? __do_munmap+0xc7a/0xed0 [ 1274.106297] ? mmap_region+0x698/0x1ca0 [ 1274.106312] ? do_mmap+0xa09/0x1220 [ 1274.106327] ? vm_mmap_pgoff+0x20b/0x2b0 [ 1274.106344] ? __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 1274.134832] should_fail.cold+0xa/0x15 [ 1274.138735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.143844] ? lock_downgrade+0x910/0x910 [ 1274.147997] ? kasan_check_read+0x11/0x20 [ 1274.152157] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1274.157451] ? add_lock_to_list.isra.0+0x450/0x450 [ 1274.162397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.167954] ? vm_area_dup+0x7a/0x230 [ 1274.171784] __should_failslab+0x121/0x190 [ 1274.176032] should_failslab+0x9/0x14 [ 1274.179844] kmem_cache_alloc+0x47/0x710 [ 1274.183912] ? vm_area_dup+0x7a/0x230 [ 1274.187740] ? vm_area_dup+0x7a/0x230 [ 1274.191552] ? rcu_read_lock_sched_held+0x110/0x130 [ 1274.196588] anon_vma_clone+0x148/0x750 [ 1274.200577] ? memcpy+0x46/0x50 [ 1274.203873] ? unlink_anon_vmas+0xa50/0xa50 [ 1274.208293] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1274.213837] ? may_expand_vm+0x1c7/0x8b0 [ 1274.217912] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1274.222963] __split_vma+0x180/0x570 [ 1274.226691] ? find_vma+0x30/0x170 [ 1274.230248] __do_munmap+0xc7a/0xed0 [ 1274.233973] ? __check_object_size+0xa3/0x77a [ 1274.238483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.244029] ? check_preemption_disabled+0x48/0x290 [ 1274.249070] mmap_region+0x698/0x1ca0 [ 1274.252885] ? get_pid_task+0xd4/0x190 [ 1274.256819] ? __x64_sys_brk+0x8f0/0x8f0 [ 1274.260893] ? arch_get_unmapped_area+0x730/0x730 [ 1274.265753] ? rcu_read_unlock_special+0x380/0x380 [ 1274.270709] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1274.275733] ? cap_mmap_addr+0x4f/0x130 [ 1274.279721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.285269] ? security_mmap_addr+0x7f/0xb0 [ 1274.289607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1274.295156] ? get_unmapped_area+0x295/0x3b0 [ 1274.299583] do_mmap+0xa09/0x1220 [ 1274.303058] ? mmap_region+0x1ca0/0x1ca0 [ 1274.307126] ? vm_mmap_pgoff+0x1ad/0x2b0 [ 1274.311199] ? down_read_killable+0x150/0x150 [ 1274.315702] ? security_mmap_file+0x1a7/0x1e0 [ 1274.320218] vm_mmap_pgoff+0x20b/0x2b0 [ 1274.324140] ? vma_is_stack_for_current+0xd0/0xd0 [ 1274.329018] ? __sb_end_write+0xd9/0x110 [ 1274.333099] ksys_mmap_pgoff+0x102/0x650 [ 1274.337175] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1274.341948] ? trace_hardirqs_on+0xbd/0x310 [ 1274.346274] ? __ia32_sys_read+0xb0/0xb0 [ 1274.350341] ? entry_SYSENTER_compat+0x70/0x7f [ 1274.354943] ? trace_hardirqs_off_caller+0x300/0x300 [ 1274.360069] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 1274.364582] do_fast_syscall_32+0x333/0xf98 [ 1274.368927] ? do_int80_syscall_32+0x880/0x880 [ 1274.373513] ? trace_hardirqs_off+0x310/0x310 [ 1274.378021] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1274.383426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.388977] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1274.394010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.398885] entry_SYSENTER_compat+0x70/0x7f [ 1274.403318] RIP: 0023:0xf7fd0869 [ 1274.406694] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1274.425603] RSP: 002b:00000000f5fcc0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 1274.433319] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000e73000 02:49:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x19, r0, 0x0, &(0x7f0000000300)='self\'') [ 1274.440606] RDX: 0000000000000000 RSI: 0000000000000032 RDI: 00000000ffffffff [ 1274.447893] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1274.455179] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1274.462455] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:49:49 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1274.700198] FAULT_INJECTION: forcing a failure. [ 1274.700198] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.716561] CPU: 0 PID: 11601 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1274.723452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.732811] Call Trace: [ 1274.735422] dump_stack+0x1db/0x2d0 [ 1274.739081] ? dump_stack_print_info.cold+0x20/0x20 [ 1274.744116] ? add_lock_to_list.isra.0+0x450/0x450 02:49:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 02:49:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xc515], [], @loopback}}, r1}}, 0x48) 02:49:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x6, r0, 0x0, &(0x7f0000000300)='self\'') [ 1274.749057] ? __get_user_4+0x21/0x30 [ 1274.752875] ? percpu_ref_put_many+0x129/0x270 [ 1274.757475] should_fail.cold+0xa/0x15 [ 1274.761378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1274.766495] ? ___might_sleep+0x1e7/0x310 [ 1274.770652] ? arch_local_save_flags+0x50/0x50 [ 1274.775243] ? lock_downgrade+0x910/0x910 [ 1274.779403] ? __anon_vma_prepare+0x33e/0x760 [ 1274.783933] __should_failslab+0x121/0x190 [ 1274.788194] should_failslab+0x9/0x14 [ 1274.792001] kmem_cache_alloc+0x2be/0x710 [ 1274.796158] ? up_write+0x7b/0x230 [ 1274.796356] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1274.799709] ? down_write_nested+0x130/0x130 [ 1274.799732] __khugepaged_enter+0xa9/0x5c0 [ 1274.799752] ? khugepaged+0x18a0/0x18a0 [ 1274.799771] ? anon_vma_fork+0x880/0x880 [ 1274.799799] do_huge_pmd_anonymous_page+0x11ed/0x1840 [ 1274.824698] ? __lock_acquire+0x572/0x4a30 [ 1274.824720] ? __thp_get_unmapped_area+0x190/0x190 [ 1274.824736] ? mark_held_locks+0x100/0x100 [ 1274.838198] ? mark_held_locks+0x100/0x100 [ 1274.838214] ? mark_held_locks+0x100/0x100 [ 1274.838229] ? pud_val+0x85/0x100 [ 1274.838243] ? pmd_val+0x100/0x100 [ 1274.838261] ? __might_fault+0x12b/0x1e0 [ 1274.866905] __handle_mm_fault+0x38e7/0x5690 [ 1274.871347] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1274.873510] Error parsing options; rc = [-22] [ 1274.876192] ? check_preemption_disabled+0x48/0x290 [ 1274.876210] ? handle_mm_fault+0x3cc/0xc80 [ 1274.876243] ? lock_downgrade+0x910/0x910 [ 1274.876259] ? kasan_check_read+0x11/0x20 [ 1274.876276] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1274.876294] ? rcu_read_unlock_special+0x380/0x380 [ 1274.876314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1274.876331] ? check_preemption_disabled+0x48/0x290 [ 1274.876353] handle_mm_fault+0x4ec/0xc80 [ 1274.876371] ? __handle_mm_fault+0x5690/0x5690 [ 1274.876388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.876406] ? vmacache_update+0x114/0x140 [ 1274.876434] __do_page_fault+0x5da/0xd60 [ 1274.876460] do_page_fault+0xe6/0x7d8 [ 1274.876479] ? vmalloc_sync_all+0x30/0x30 [ 1274.876494] ? find_held_lock+0x35/0x120 [ 1274.876512] ? __might_fault+0x12b/0x1e0 [ 1274.876534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.876557] page_fault+0x1e/0x30 [ 1274.876572] RIP: 0010:__get_user_4+0x21/0x30 [ 1274.876587] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 1274.876595] RSP: 0018:ffff8880984e7d98 EFLAGS: 00010206 [ 1274.876608] RAX: 00000000200001c3 RBX: 0000000000000007 RCX: ffffc90006603000 [ 1274.876617] RDX: ffffffffffffffff RSI: ffffffff81b400a3 RDI: 0000000000000286 [ 1274.876628] RBP: ffff8880984e7e30 R08: ffff88809a4ea5c0 R09: 0000000000000001 [ 1274.876637] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880984e7f58 [ 1274.876646] R13: 1ffff1101309cfb5 R14: 00000000200001c0 R15: 00000000f7f81869 [ 1274.876674] ? __might_fault+0x1a3/0x1e0 [ 1275.035001] ? __ia32_compat_sys_io_setup+0xc3/0x4e0 [ 1275.040111] ? entry_SYSENTER_compat+0x70/0x7f [ 1275.044697] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1275.049280] ? __do_page_fault+0x3f1/0xd60 [ 1275.053532] do_fast_syscall_32+0x333/0xf98 [ 1275.057860] ? do_int80_syscall_32+0x880/0x880 [ 1275.062444] ? trace_hardirqs_off+0x310/0x310 [ 1275.066968] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1275.071902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.077451] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1275.082475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1275.087326] entry_SYSENTER_compat+0x70/0x7f [ 1275.091735] RIP: 0023:0xf7f81869 [ 1275.095119] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1275.114018] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1275.121730] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1275.129001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1275.136272] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1275.143540] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1275.150816] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1275.168222] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1275.192594] Error parsing options; rc = [-22] 02:49:50 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1275.197961] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1275.224193] Error parsing options; rc = [-22] [ 1275.232454] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x7, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [], @loopback}}, r1}}, 0x48) [ 1275.272028] FAULT_INJECTION: forcing a failure. [ 1275.272028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1275.360276] CPU: 0 PID: 11623 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1275.367312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1275.376689] Call Trace: [ 1275.379300] dump_stack+0x1db/0x2d0 [ 1275.382990] ? dump_stack_print_info.cold+0x20/0x20 [ 1275.388037] ? __do_page_fault+0x5da/0xd60 [ 1275.392293] ? do_page_fault+0xe6/0x7d8 [ 1275.396284] ? page_fault+0x1e/0x30 [ 1275.399951] ? __get_user_4+0x21/0x30 [ 1275.403827] ? do_fast_syscall_32+0x333/0xf98 [ 1275.408356] should_fail.cold+0xa/0x15 [ 1275.412266] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1275.417399] ? arch_local_save_flags+0x50/0x50 [ 1275.422002] ? lock_release+0xc40/0xc40 [ 1275.426021] should_fail_alloc_page+0x50/0x60 [ 1275.430536] __alloc_pages_nodemask+0x323/0xdc0 [ 1275.435226] ? kasan_check_read+0x11/0x20 [ 1275.439404] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1275.444441] ? up_write+0x7b/0x230 [ 1275.448013] ? kasan_check_write+0x14/0x20 [ 1275.452266] ? __khugepaged_enter+0x41f/0x5c0 [ 1275.456783] ? khugepaged+0x18a0/0x18a0 [ 1275.460784] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1275.466348] alloc_pages_current+0x107/0x210 [ 1275.470783] pte_alloc_one+0x1b/0x1a0 [ 1275.474604] do_huge_pmd_anonymous_page+0xbf2/0x1840 [ 1275.479727] ? __lock_acquire+0x572/0x4a30 [ 1275.483999] ? __thp_get_unmapped_area+0x190/0x190 [ 1275.488971] ? mark_held_locks+0x100/0x100 [ 1275.493229] ? mark_held_locks+0x100/0x100 [ 1275.497483] ? mark_held_locks+0x100/0x100 [ 1275.501732] ? pud_val+0x85/0x100 [ 1275.505202] ? pmd_val+0x100/0x100 [ 1275.508763] ? __might_fault+0x12b/0x1e0 [ 1275.512853] __handle_mm_fault+0x38e7/0x5690 [ 1275.517301] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1275.522168] ? check_preemption_disabled+0x48/0x290 [ 1275.527207] ? handle_mm_fault+0x3cc/0xc80 [ 1275.531486] ? lock_downgrade+0x910/0x910 [ 1275.535650] ? kasan_check_read+0x11/0x20 [ 1275.539818] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1275.545114] ? rcu_read_unlock_special+0x380/0x380 [ 1275.550068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1275.555630] ? check_preemption_disabled+0x48/0x290 [ 1275.560679] handle_mm_fault+0x4ec/0xc80 [ 1275.564770] ? __handle_mm_fault+0x5690/0x5690 [ 1275.569375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.574960] ? vmacache_update+0x114/0x140 [ 1275.579230] __do_page_fault+0x5da/0xd60 [ 1275.583333] do_page_fault+0xe6/0x7d8 [ 1275.587162] ? vmalloc_sync_all+0x30/0x30 [ 1275.591327] ? find_held_lock+0x35/0x120 [ 1275.595404] ? __might_fault+0x12b/0x1e0 [ 1275.599500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1275.604376] page_fault+0x1e/0x30 [ 1275.607850] RIP: 0010:__get_user_4+0x21/0x30 [ 1275.612276] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 1275.631192] RSP: 0018:ffff88805dc47d98 EFLAGS: 00010206 [ 1275.636578] RAX: 00000000200001c3 RBX: 0000000000000007 RCX: ffffc90006603000 [ 1275.643863] RDX: ffffffffffffffff RSI: ffffffff81b400a3 RDI: 0000000000000286 [ 1275.651174] RBP: ffff88805dc47e30 R08: ffff8880a09cc340 R09: 0000000000000001 [ 1275.658456] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88805dc47f58 [ 1275.665739] R13: 1ffff1100bb88fb5 R14: 00000000200001c0 R15: 00000000f7f81869 [ 1275.673054] ? __might_fault+0x1a3/0x1e0 [ 1275.677144] ? __ia32_compat_sys_io_setup+0xc3/0x4e0 [ 1275.682264] ? entry_SYSENTER_compat+0x70/0x7f [ 1275.686868] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1275.691469] ? __do_page_fault+0x3f1/0xd60 [ 1275.695741] do_fast_syscall_32+0x333/0xf98 [ 1275.700090] ? do_int80_syscall_32+0x880/0x880 [ 1275.704687] ? trace_hardirqs_off+0x310/0x310 [ 1275.709202] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1275.714153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1275.719708] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1275.724755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1275.729628] entry_SYSENTER_compat+0x70/0x7f [ 1275.734053] RIP: 0023:0xf7f81869 [ 1275.737456] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1275.756370] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1275.764100] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1275.771386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1275.778671] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1275.785975] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1275.793258] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1275.809306] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1275.823119] Error parsing options; rc = [-22] [ 1275.828304] Error parsing options; rc = [-22] [ 1275.840384] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], [], @loopback}}, r1}}, 0x48) 02:49:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1275.866416] Error parsing options; rc = [-22] 02:49:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1276.000827] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.031626] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.045230] Error parsing options; rc = [-22] [ 1276.053312] Error parsing options; rc = [-22] [ 1276.065001] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.071165] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.102494] Error parsing options; rc = [-22] [ 1276.179273] Error parsing options; rc = [-22] 02:49:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0], [], @loopback}}, r1}}, 0x48) 02:49:51 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0xd, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xdfffe000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1276.371362] FAULT_INJECTION: forcing a failure. [ 1276.371362] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.388821] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.396243] CPU: 1 PID: 11668 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1276.408112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.417481] Call Trace: [ 1276.420100] dump_stack+0x1db/0x2d0 [ 1276.421197] Error parsing options; rc = [-22] [ 1276.423755] ? dump_stack_print_info.cold+0x20/0x20 [ 1276.423786] should_fail.cold+0xa/0x15 [ 1276.423807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1276.423831] ? ___might_sleep+0x1e7/0x310 [ 1276.435445] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.437237] ? arch_local_save_flags+0x50/0x50 [ 1276.437272] __should_failslab+0x121/0x190 [ 1276.437292] should_failslab+0x9/0x14 [ 1276.437308] kmem_cache_alloc+0x2be/0x710 [ 1276.437329] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1276.442561] Error parsing options; rc = [-22] [ 1276.446606] ptlock_alloc+0x20/0x70 [ 1276.446627] pte_alloc_one+0x6d/0x1a0 [ 1276.446646] do_huge_pmd_anonymous_page+0xbf2/0x1840 [ 1276.446663] ? __lock_acquire+0x572/0x4a30 [ 1276.446684] ? __thp_get_unmapped_area+0x190/0x190 [ 1276.485791] ? mark_held_locks+0x100/0x100 [ 1276.493218] ? mark_held_locks+0x100/0x100 [ 1276.493242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.493257] ? pud_val+0x85/0x100 [ 1276.493272] ? pmd_val+0x100/0x100 [ 1276.493290] ? debug_smp_processor_id+0x1c/0x20 [ 1276.530476] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.533224] __handle_mm_fault+0x38e7/0x5690 [ 1276.533254] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1276.533271] ? check_preemption_disabled+0x48/0x290 [ 1276.533289] ? handle_mm_fault+0x3cc/0xc80 [ 1276.533323] ? lock_downgrade+0x910/0x910 [ 1276.533343] ? kasan_check_read+0x11/0x20 [ 1276.556120] Error parsing options; rc = [-22] [ 1276.559976] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1276.559997] ? rcu_read_unlock_special+0x380/0x380 [ 1276.560019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1276.560036] ? check_preemption_disabled+0x48/0x290 [ 1276.560060] handle_mm_fault+0x4ec/0xc80 [ 1276.560083] ? __handle_mm_fault+0x5690/0x5690 [ 1276.560101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.560120] ? vmacache_update+0x114/0x140 [ 1276.571719] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1276.572668] __do_page_fault+0x5da/0xd60 [ 1276.572700] do_page_fault+0xe6/0x7d8 [ 1276.572721] ? vmalloc_sync_all+0x30/0x30 [ 1276.572738] ? find_held_lock+0x35/0x120 [ 1276.577429] Error parsing options; rc = [-22] [ 1276.582514] ? __might_fault+0x12b/0x1e0 [ 1276.582539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1276.582565] page_fault+0x1e/0x30 [ 1276.582586] RIP: 0010:__get_user_4+0x21/0x30 [ 1276.666062] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 1276.684987] RSP: 0018:ffff88805dc47d98 EFLAGS: 00010206 [ 1276.690358] RAX: 00000000200001c3 RBX: 0000000000000007 RCX: ffffc90006603000 [ 1276.697636] RDX: ffffffffffffffff RSI: ffffffff81b400a3 RDI: 0000000000000286 [ 1276.704918] RBP: ffff88805dc47e30 R08: ffff888096c20380 R09: 0000000000000001 [ 1276.712216] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88805dc47f58 [ 1276.719495] R13: 1ffff1100bb88fb5 R14: 00000000200001c0 R15: 00000000f7f81869 [ 1276.726798] ? __might_fault+0x1a3/0x1e0 [ 1276.730881] ? __ia32_compat_sys_io_setup+0xc3/0x4e0 [ 1276.736005] ? entry_SYSENTER_compat+0x70/0x7f [ 1276.740601] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1276.745197] ? __do_page_fault+0x3f1/0xd60 [ 1276.749468] do_fast_syscall_32+0x333/0xf98 [ 1276.753808] ? do_int80_syscall_32+0x880/0x880 [ 1276.758404] ? trace_hardirqs_off+0x310/0x310 [ 1276.762913] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1276.767883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1276.773437] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1276.778488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1276.783401] entry_SYSENTER_compat+0x70/0x7f [ 1276.787820] RIP: 0023:0xf7f81869 [ 1276.791202] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1276.810115] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 02:49:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x02', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1276.817833] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1276.825115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1276.832395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1276.839671] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1276.846971] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1276.862269] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x700], [], @loopback}}, r1}}, 0x48) [ 1276.899977] Error parsing options; rc = [-22] [ 1276.915492] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:52 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) [ 1277.006471] Error parsing options; rc = [-22] 02:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x12, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], @loopback}}, r1}}, 0x48) 02:49:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xffffe000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 02:49:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\a', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 02:49:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1277.194251] FAULT_INJECTION: forcing a failure. [ 1277.194251] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.267045] CPU: 1 PID: 11709 Comm: syz-executor3 Not tainted 4.20.0+ #2 [ 1277.273980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.283351] Call Trace: [ 1277.285991] dump_stack+0x1db/0x2d0 [ 1277.289654] ? dump_stack_print_info.cold+0x20/0x20 [ 1277.294698] ? add_lock_to_list.isra.0+0x450/0x450 [ 1277.299663] should_fail.cold+0xa/0x15 [ 1277.303580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1277.308713] ? ___might_sleep+0x1e7/0x310 [ 1277.309878] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1277.312882] ? arch_local_save_flags+0x50/0x50 [ 1277.312899] ? lock_downgrade+0x910/0x910 [ 1277.312916] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1277.312966] __should_failslab+0x121/0x190 [ 1277.312986] should_failslab+0x9/0x14 [ 1277.313000] kmem_cache_alloc+0x2be/0x710 [ 1277.313015] ? kasan_check_write+0x14/0x20 [ 1277.313033] ? up_read+0x212/0x2b0 [ 1277.313051] ? up_read_non_owner+0x100/0x100 [ 1277.335505] Error parsing options; rc = [-22] [ 1277.339405] ioctx_alloc+0x1a5/0x2140 [ 1277.339430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.339456] ? __do_page_fault+0x3f1/0xd60 [ 1277.339480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1277.339497] ? io_submit_one+0x1050/0x1050 [ 1277.339513] ? retint_kernel+0x2d/0x2d [ 1277.339529] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1277.339545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1277.339562] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1277.339576] ? find_held_lock+0x35/0x120 [ 1277.339593] ? __might_fault+0x12b/0x1e0 [ 1277.359358] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1277.359548] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1277.359571] ? __do_page_fault+0x3f1/0xd60 [ 1277.359592] ? retint_kernel+0x2d/0x2d [ 1277.364305] Error parsing options; rc = [-22] [ 1277.368509] ? __might_fault+0x1a3/0x1e0 [ 1277.368533] __ia32_compat_sys_io_setup+0x116/0x4e0 [ 1277.368549] ? entry_SYSENTER_compat+0x70/0x7f [ 1277.368565] ? __ia32_sys_io_setup+0x4e0/0x4e0 02:49:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], [], @loopback}}, r1}}, 0x48) 02:49:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 02:49:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2001001000000000], [], @loopback}}, r1}}, 0x48) [ 1277.368580] ? __do_page_fault+0x3f1/0xd60 [ 1277.368607] do_fast_syscall_32+0x333/0xf98 [ 1277.368626] ? do_int80_syscall_32+0x880/0x880 [ 1277.463874] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1277.466263] ? trace_hardirqs_off+0x310/0x310 [ 1277.466284] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1277.466305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.466323] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1277.466345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1277.466370] entry_SYSENTER_compat+0x70/0x7f [ 1277.466383] RIP: 0023:0xf7f81869 [ 1277.466400] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1277.466412] RSP: 002b:00000000f5f7d0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1277.474116] Error parsing options; rc = [-22] [ 1277.474987] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 02:49:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0xf, r0, 0x0, &(0x7f0000000300)='self\'') 02:49:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1277.474997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1277.475005] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1277.475014] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1277.475024] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1277.581696] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:52 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], @loopback}}, r1}}, 0x48) 02:49:52 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20200, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/128) 02:49:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x18, r0, 0x0, &(0x7f0000000300)='self\'') [ 1277.706097] Error parsing options; rc = [-22] [ 1277.719627] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1277.766328] Error parsing options; rc = [-22] [ 1277.785059] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 02:49:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe73000)=nil, 0xe73002, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1277.813628] ================================================================== [ 1277.821389] BUG: KASAN: stack-out-of-bounds in keyctl_pkey_params_get+0x4c7/0x550 [ 1277.829050] Read of size 1 at addr ffff888089aefc90 by task syz-executor4/11760 [ 1277.836520] [ 1277.838189] CPU: 0 PID: 11760 Comm: syz-executor4 Not tainted 4.20.0+ #2 [ 1277.845062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.852122] Error parsing options; rc = [-22] [ 1277.854448] Call Trace: [ 1277.854485] dump_stack+0x1db/0x2d0 [ 1277.854522] ? dump_stack_print_info.cold+0x20/0x20 [ 1277.870283] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1277.875179] print_address_description.cold+0x7c/0x20d [ 1277.880489] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1277.885368] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1277.890243] kasan_report.cold+0x1b/0x40 [ 1277.894356] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1277.899239] __asan_report_load1_noabort+0x14/0x20 [ 1277.904205] keyctl_pkey_params_get+0x4c7/0x550 [ 1277.908958] ? __keyctl_dh_compute.cold+0x63/0x63 02:49:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 1277.913886] keyctl_pkey_query+0xb8/0x2a0 [ 1277.918109] ? keyctl_pkey_params_get_2+0x570/0x570 [ 1277.923166] ? get_old_timespec32+0x2a0/0x2a0 [ 1277.927696] ? do_fast_syscall_32+0x13b/0xf98 [ 1277.932222] ? do_fast_syscall_32+0x13b/0xf98 [ 1277.936785] ? trace_hardirqs_on+0xbd/0x310 [ 1277.941152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.946722] ? entry_SYSENTER_compat+0x70/0x7f [ 1277.951335] ? trace_hardirqs_off_caller+0x300/0x300 [ 1277.956479] __ia32_compat_sys_keyctl+0x152/0x420 [ 1277.961365] do_fast_syscall_32+0x333/0xf98 [ 1277.965728] ? do_int80_syscall_32+0x880/0x880 [ 1277.970352] ? trace_hardirqs_off+0x310/0x310 [ 1277.974876] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1277.979840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.985404] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1277.990462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1277.995350] entry_SYSENTER_compat+0x70/0x7f [ 1277.999785] RIP: 0023:0xf7fee869 [ 1278.003176] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1278.022104] RSP: 002b:00000000f5fea0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000120 [ 1278.029840] RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 0000000000000000 [ 1278.037129] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000000 [ 1278.044421] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1278.051715] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1278.059008] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1278.066337] [ 1278.067984] The buggy address belongs to the page: [ 1278.072967] page:ffffea000226bbc0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 1278.081136] flags: 0x1fffc0000000000() [ 1278.085052] raw: 01fffc0000000000 0000000000000000 ffffffff02260101 0000000000000000 [ 1278.092983] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1278.100884] page dumped because: kasan: bad access detected [ 1278.106627] [ 1278.108274] Memory state around the buggy address: [ 1278.113224] ffff888089aefb80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 [ 1278.120606] ffff888089aefc00: 00 00 00 f2 00 00 00 f2 f2 f2 00 00 00 00 00 00 [ 1278.128012] >ffff888089aefc80: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 1278.135386] ^ [ 1278.139300] ffff888089aefd00: 00 f1 f1 f1 f1 f1 f1 00 00 f2 f2 00 00 00 00 00 [ 1278.147030] ffff888089aefd80: 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 [ 1278.154402] ================================================================== [ 1278.161775] Disabling lock debugging due to kernel taint 02:49:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x0, &(0x7f0000000180)='\x00\x00\x00') connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 1278.169834] FAULT_INJECTION: forcing a failure. [ 1278.169834] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.241055] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1278.249041] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1278.264608] CPU: 0 PID: 11765 Comm: syz-executor3 Tainted: G B 4.20.0+ #2 [ 1278.269003] Error parsing options; rc = [-22] [ 1278.274117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.274124] Call Trace: [ 1278.274151] dump_stack+0x1db/0x2d0 [ 1278.274175] ? dump_stack_print_info.cold+0x20/0x20 [ 1278.274192] ? native_iret+0x7/0x7 [ 1278.274210] ? error_exit+0xb/0x20 [ 1278.300594] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1278.302828] should_fail.cold+0xa/0x15 [ 1278.302847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1278.302861] ? lock_acquire+0x1db/0x570 [ 1278.302880] ? ___might_sleep+0x1e7/0x310 [ 1278.306632] Error parsing options; rc = [-22] [ 1278.318730] ? arch_local_save_flags+0x50/0x50 [ 1278.318759] __should_failslab+0x121/0x190 [ 1278.318777] should_failslab+0x9/0x14 [ 1278.318791] kmem_cache_alloc+0x2be/0x710 [ 1278.318814] vm_area_alloc+0x7a/0x1d0 [ 1278.318831] ? arch_release_thread_stack+0x10/0x10 [ 1278.348486] Kernel panic - not syncing: panic_on_warn set ... [ 1278.349273] mmap_region+0x93b/0x1ca0 [ 1278.375627] ? __x64_sys_brk+0x8f0/0x8f0 [ 1278.379960] ? arch_get_unmapped_area+0x730/0x730 [ 1278.384836] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1278.389861] ? cap_mmap_addr+0x4f/0x130 [ 1278.393849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.399397] ? security_mmap_addr+0x7f/0xb0 [ 1278.403731] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1278.409280] ? get_unmapped_area+0x295/0x3b0 [ 1278.413705] do_mmap+0xa09/0x1220 [ 1278.417178] ? mmap_region+0x1ca0/0x1ca0 [ 1278.421250] ? ioctx_alloc+0x90e/0x2140 [ 1278.425240] ? down_read_killable+0x150/0x150 [ 1278.429746] ? get_next_ino+0xf9/0x170 [ 1278.433648] ioctx_alloc+0x991/0x2140 [ 1278.437474] ? io_submit_one+0x1050/0x1050 [ 1278.441721] ? error_exit+0xb/0x20 [ 1278.445277] ? __might_fault+0x12b/0x1e0 [ 1278.449349] ? lock_acquire+0x1db/0x570 [ 1278.453336] ? __might_fault+0xfb/0x1e0 [ 1278.457321] ? lock_downgrade+0x910/0x910 [ 1278.461483] ? lock_release+0xc40/0xc40 [ 1278.465469] ? __sb_end_write+0xd9/0x110 [ 1278.469553] __ia32_compat_sys_io_setup+0x116/0x4e0 [ 1278.474583] ? entry_SYSENTER_compat+0x70/0x7f [ 1278.479178] ? __ia32_sys_io_setup+0x4e0/0x4e0 [ 1278.483773] ? __do_page_fault+0x3f1/0xd60 [ 1278.488031] do_fast_syscall_32+0x333/0xf98 [ 1278.492367] ? do_int80_syscall_32+0x880/0x880 [ 1278.496975] ? trace_hardirqs_off+0x310/0x310 [ 1278.501481] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1278.506430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.511985] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1278.517029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1278.521889] entry_SYSENTER_compat+0x70/0x7f [ 1278.526345] RIP: 0023:0xf7f81869 [ 1278.529729] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1278.548657] RSP: 002b:00000000f5f5c0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000f5 [ 1278.556376] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00000000200001c0 [ 1278.563655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1278.570954] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1278.578233] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1278.585513] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1278.592815] CPU: 1 PID: 11760 Comm: syz-executor4 Tainted: G B 4.20.0+ #2 [ 1278.601065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.608783] Error parsing options; rc = [-22] [ 1278.610431] Call Trace: [ 1278.610464] dump_stack+0x1db/0x2d0 [ 1278.610485] ? dump_stack_print_info.cold+0x20/0x20 [ 1278.610508] panic+0x2cb/0x589 [ 1278.620407] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1278.621224] ? add_taint.cold+0x16/0x16 [ 1278.630765] Error parsing options; rc = [-22] [ 1278.641744] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1278.641764] ? preempt_schedule+0x4b/0x60 [ 1278.641781] ? ___preempt_schedule+0x16/0x18 [ 1278.641797] ? trace_hardirqs_on+0xb4/0x310 [ 1278.667998] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1278.672861] end_report+0x47/0x4f [ 1278.676332] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1278.681198] kasan_report.cold+0xe/0x40 [ 1278.685195] ? keyctl_pkey_params_get+0x4c7/0x550 [ 1278.690068] __asan_report_load1_noabort+0x14/0x20 [ 1278.695025] keyctl_pkey_params_get+0x4c7/0x550 [ 1278.699717] ? __keyctl_dh_compute.cold+0x63/0x63 [ 1278.704600] keyctl_pkey_query+0xb8/0x2a0 [ 1278.708775] ? keyctl_pkey_params_get_2+0x570/0x570 [ 1278.713811] ? get_old_timespec32+0x2a0/0x2a0 [ 1278.718333] ? do_fast_syscall_32+0x13b/0xf98 [ 1278.722854] ? do_fast_syscall_32+0x13b/0xf98 [ 1278.727373] ? trace_hardirqs_on+0xbd/0x310 [ 1278.731712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.734206] kobject: 'loop1' (00000000a151825d): kobject_uevent_env [ 1278.737263] ? entry_SYSENTER_compat+0x70/0x7f [ 1278.737279] ? trace_hardirqs_off_caller+0x300/0x300 [ 1278.737299] __ia32_compat_sys_keyctl+0x152/0x420 [ 1278.737318] do_fast_syscall_32+0x333/0xf98 [ 1278.743748] kobject: 'loop1' (00000000a151825d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1278.748313] ? do_int80_syscall_32+0x880/0x880 [ 1278.748326] ? trace_hardirqs_off+0x310/0x310 [ 1278.748343] ? syscall_return_slowpath+0x3b0/0x5f0 [ 1278.748362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.768179] kobject: 'loop2' (0000000047f3b0a4): kobject_uevent_env [ 1278.772073] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1278.772094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1278.788841] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1278.791649] entry_SYSENTER_compat+0x70/0x7f [ 1278.791662] RIP: 0023:0xf7fee869 [ 1278.791679] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1278.791687] RSP: 002b:00000000f5fea0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000120 [ 1278.798258] kobject: 'loop2' (0000000047f3b0a4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1278.803131] RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 0000000000000000 [ 1278.803140] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000000 [ 1278.803148] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1278.803159] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1278.808706] Error parsing options; rc = [-22] [ 1278.820305] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1278.821732] Kernel Offset: disabled [ 1278.910120] Rebooting in 86400 seconds..